The most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishrif Formation; MA, MB11, MB12, MB21, MC1, and MC2. The precise facies modelling is constructed by using Petrel software while applying different appropriate scale-up methods. Consequently, the petrophysical properties such as porosity, water saturation and permeability are distributed within each unit depending on facies modelling. The Net to a gross parameter which has a significant impact on determining original oil in place (OIIP) also calculated and distributed using facies modelling. The facies modelling is performed to obtain an accurate estimation of OIIP. Finally, the results of the facies investigation have a significant effect on petrophysical properties and therefore affect the estimation of OIIP by 2\% for the whole Mishrif Formation.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreA geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has
... Show MoreThe auditor has a role in allocating joint costs in the gas industry, and the auditor's procedures are considered as systematic critical examination, analysis and evaluation of everything related to costs in general and joint costs in the gas industry in particular, with the aim of controlling the joint costs of gas industry products, and knowing the share of the cost of each product from the total industry costs Gas products reflect the reality of the company's performance by discovering weaknesses, defects and any errors, to ensure increased effectiveness and efficiency of the parties concerned with auditing them and imposing control and control over the company's resources, as well as
... Show MoreAs the banking sector is a strong influence on the country's economic growth,The solid financial well-being of anybank does not mean only a guarantee for its investors, It is also important for both owners and workers and for theeconomy in all its joints.The elements of capital adequacy and quality of assets are important to the functioning of thebanking business.In this study, the research sample included four private banks. Quarterly data were used for the period(2011 - 2018).Moreover, data is also collected from articles, papers, the World Wide Web (the Internet) and specializedinternational journals.In this research, an effort was made to try to find out the effect of (the ratio of the capital owned todeposits on the value of the bank),
... Show MoreFuture wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser
... Show MoreA variety of new phenolic Schiff bases derivatives have been synthesized starting from Terephthaladehyde compound, all proposed structures were supported by FTIR, 1H-NMR, 13C-NMR, Elemental analysis, some derivatives evaluated by Thermal analysis (TGA).
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More