Records of two regionalized variables were processed for each of porosity and permeability of reservoir rocks in Zubair Formation (Zb-109) south Iraq as an indication of the most important reservoir property which is the homogeneity,considering their important results in criterion most needed for primary and enhanced oil reservoirs.The results of dispersion treatment,the statistical incorporeal indications,boxes plots,rhombus style and tangents angles of intersected circles indicated by confidence interval of porosity and permeability data, have shown that the reservoir rocks of Zubair units (LS),(1L) and (DJ) have reservoir properties of high quality,in contrast to that of Zubair units (MS) and (AB)which have reservoir properties of less quality than the rest.In addition,the co- efficient of the central tendency of permeability data for the reservoir rocks have indicated the homogeneity,systematic and normal distribution, in contrast to porosity data of (DJ) & (AB) units that follow a distribution which predominate in difference and heterogeneity in their values.
The (Richard Wagner) of cultural figures rare collected between philosophy and literature and the arts to reach the concept of the artwork destruction (Gesamtkunstwerk), who called for by the movement romantic, he is a thinker, and composer renewed, and playwright, designer and architect of a special kind.Able ( Wagner ) that translates his thoughts technical and design in the field of opera and disclose those ideas models actual dealt joints essential this art heritage, which was developed and laid his modern rules approach by achieving his dream creates theater ideal, which was held in the city ( Bayreuth) in ( Bavaria ), one of the German Federal States .The study reviews the ideas of Wagner and their sources, which have had an import
... Show MoreAbadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
Objectives: The study aim was to explore the knowledge, perceptions, and attitudes of Iraqi physicians regarding generic and locally manufactured medicines. Methods: A total of 124 physicians were involved in this cross -sectional study. The convenience sample was collected from five public hospitals in Baghdad. A self-administered questionnaire was distributed and collected in-person. Fisher's Exact Test was used to measure the association between physician years of experience, gender and categorical (perception and knowledge) variables. Results: Most respondent answers regarding the knowledge of generic medicines were incorrect. Only up to one-third of the participants knew that generic medicines are therapeutically eq
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show More