Setting-up a 3D geological model both from field and subsurface data is a typical task in geological studies involving natural resource evaluation and hazard assessment. In this study a 3D geological model for Mishrif Formation in Garraf oil field has been set-up using Petrel software. Mishrif Formation represents the most important reservoir in Garraf oil field. Four vertical oil wells (GA-4, GA-A1P, GA-3 and GA-5) and one directional well (GA-B8P) were selected in Garraf Oil Field in order to set-up structural and petrophysical (porosity and water saturation) models represented by a 3D static geological model in three dimensions. Structural model shows that Garraf oil field represents a domal structure that shows continuous growth as indicated by the structural maps at top of reservoir units. The structural closure is shifted from GA-3 well to GA-A1P well. Mishrif Formation was divided into ten zones (top Mishrif, M1, M1.2, M2, L1, L1.2, L2, L2.2, L2.3 and L2.4.). Petrophysical model (porosity and water saturation) for Mishrif Formation was set-up from values of porosity and water saturation using Sequential Gaussian Simulation algorithm. According to data analyses and the results from modeling the units (M1.2, L1 and L1.2) are considered as high quality reservoir units due to the high PHIE and low water saturation. Units (L2, L2.2, L2.3 and L2.4) are considered as poor reservoirs because of low PHIE and high water saturation, and non-reservoir units include (Top Mishrif, M1 and M2) therefore, they represent cap units. Cross sections of petrophysical model were conducted to illustrate the vertical and horizontal distribution of porosity and water saturation between wells in the field.
Abstract The purpose of this study, teach the art of performing Olympic lifts (snatch and, clean and jerk) using the two methods are instructional (self-learning associated with the model) and (reverse style of partial way). Identify the effectiveness of these methods in learning the art of performance and style of the best Olympic lifting in the learning and retention of novice for Olympic lifts. The research sample consisted of 16 lifters were selected purposively representing specialist center for the care of athletic talent to weightlifting for ages 14 years. The sample was divided into two experimental, Each group (8) eight weightlifters. The experimental group used the style of the first self-learning associated with the m
... Show MorePrediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bay
... Show MoreThe present paper concerned with study the of combined electro-osmotic peristaltic transport with heat and mass transfer which is represented by the Soret and Dufour phenomenon with the presence of the Joule electrothermal heating through a microchannel occupy by Rabinowitsch fluid. The unsteady two-dimensional governing equations for flow with energy and concentration conservation have been formed in a Cartesian coordinate system and the lubrication theory is applied to modify the relevant equations to the problem. The Debye-Hukel linearization approximation is utilizing to modify the electrohydrodynamics problem. The expressions for the axial velocity, the temperature profile, the concentration profile, and the volumetric flow rate are
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreThe present work includes a design and characteristics study of a controlling the wavelength of high power diode laser by thermoelectric cooler [TEC] . The work includes the operation of the [TEC] to control the temperature of the diode laser between ( 0- +30) °C by changing the resistance of thermistor. We can control a limited temperature of a diode laser by changing the phase cooling between hot and cold faces of the diode, this process can be attempted by comparator type [LM –311] .The theoretical results give a model for controlling the temperature with, the suitable wavelength.
This paper features the modeling and design of a pole placement and output Feedback control technique for the Active Vibration Control (AVC) of a smart flexible cantilever beam for a Single Input Single Output (SISO) case. Measurements and actuation actions done by using patches of piezoelectric layer, it is bonded to the master structure as sensor/actuator at a certain position of the cantilever beam.
The smart structure is modeled based on the concept of piezoelectric theory, Bernoulli -Euler beam theory, using Finite Element Method (FEM) and the state space techniques. The number of modes is reduced using the controllability and observability grammians retaining the first three
dominant vibratory modes, and for the reduced syste
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreMany authors investigated the problem of the early visibility of the new crescent moon after the conjunction and proposed many criteria addressing this issue in the literature. This article presented a proposed criterion for early crescent moon sighting based on a deep-learned pattern recognizer artificial neural network (ANN) performance. Moon sight datasets were collected from various sources and used to learn the ANN. The new criterion relied on the crescent width and the arc of vision from the edge of the crescent bright limb. The result of that criterion was a control value indicating the moon's visibility condition, which separated the datasets into four regions: invisible, telescope only, probably visible, and certai
... Show More