Constructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distri
... Show More
This paper aims to verify the existence of relationships between product innovation and the reputation of the organization. The study problem is that the State Organization for Marketing of Oil (SOMO) system is inflexible in terms of marketing procedures and needs innovative, unconventional methods in innovating its products and improving performance. The reputation of the organization. The importance of the study lies in that it is an attempt to raise the interest of SOMO in its approach to the research variables in order to enhance its competitive position in the future and improve the marketing business environment, which contributes to enhancing the reputation of the organization by product innovation. The study sample
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show More