Knowing the distribution of the mechanical rock properties and in-situ stresses for the field of interest is essential for many applications concerning reservoir geomechanics, including wellbore instability analysis, hydraulic fracturing, sand production, reservoir compaction, subsidence and water/gas injection throughout the filed life cycle. Determining the rock's mechanical properties is challenging because they cannot be directly measured at the borehole. The recovered carbonate core samples are limited and only provide discrete data for specific depths. This study focuses on creating a detailed 1D geomechanical model of the Mishrif reservoir in the Nasriyah oil field to identify the fault regime type for each unit in the format
... Show MorePraise be to Allaah.
My research has included the following: The field of application of semantics when fundamentalists are the book and the Sunnah. Imam Ibn Hajar agreed with the majority of fundamentalists that what is meant from the year (one word denotes one side on two things onwards), and agreed that the significance of the year specific to the rest of its members is not a definite and definite formulas of the public has the singular known as (the) Astragharism, and the plural known as ( The nationality stating that dumping, pluralism is defined as (add), and nakra, if it occurs in the context of the condition, denial and prohibition, the names of the condition, the connected names, and the word (all - all). And the year in whic
Due to the developments taking place in the field of communications, informatics systems and knowledge management in the current century, and the obligations and burdens imposed on the business organization to keep pace with these developments, the traditional methods of administrative decision-making are no longer feasible, as recent trends have emerged in management that focus on the need to rely on quantitative methods such as operations research.. The latter is one of the results of World War II, which appeared for the first time in Britain to manage war operations. The first method used in this field is the linear programming method. The use of operations research has developed greatly in the past years, and the methods of analysis in
... Show MoreThe most important contemporary issues which related to the survey of the influence of communication development technology to land use sustainability. The research aims to explain the changes that happened in the quality & land use activities performance by understanding the transformations due to modern technology and its impact on current uses and its impact on changing functional relationships between those uses to create new combinations or hybrid uses.Research will follow the analytical descriptive approach in presenting the problem of research. Research has several conclusions & recommendations, one of conclusions is the change of the place concept and its relation to changing the concept of land use and its sustai
... Show MoreIraq has the second largest proven oil reserves in the world. According to oil experts, it is expected that the Iraq's reserves to rise to 200+ billion barrels of high-grade crude.
Oil is a strategic commodity for producing and exporting countries in general, and Iraq in particular, as demonstrated by the international experience that oil is an important means to achieve economic growth, an important tool in the overall economic, social and political development. It is also an important source of hard currency for any national economy and a means to connect the local economy and the global economy. In this paper we focus our attention on selecting the best regression model that explain the effect of human capita
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe current research sheds light on an important aspect of the great and rapid development in the field of science and technology and modern manufacturing methods as a result of the scientific revolution resulting from the accelerated cognitive development, which prompted designers in general and interior design in particular to exploit and invest in digital technology and the development of digital control in the process of designing the industrial product for the purpose of creativity and innovation through these digital programs Digital models achieve the requirements and desires of the interior designer according to the creative skill using modern software with high efficiency And extreme accuracy that is consistent with the requirem
... Show More