Reservoir study has been developed in order to get a full interesting of the Nahr Umr formation in Ratawi oil field. Oil in place has been calculated for Nahr Umr which was 2981.37 MM BBL. Several runs have been performed to get matching between measured and calculated of oil production data and well test pressure. In order to get the optimum performance of Nahr Umr many strategies have been proposed in this study where vertical and horizontal wells were involved in addition to different production rates. The reservoir was first assumed to be developed with vertical wells only using production rate of (80000–125000) STB/day. The reservoir is also proposed to produce using horizontal wells besides vertical wells with production rat
... Show MoreNanofluids, liquid suspensions of nanoparticles (Np), are an effective agent to alter the wettability of oil-wet reservoirs to water-wet thus promoting hydrocarbon recovery. It can also have an application to more efficient carbon storage. We present a series of contact angle (θ) investigations on initially oil-wet calcite surfaces to quantify the performance of hydrophilic silica nanoparticles for wettability alteration. These tests are conducted at typical in-situ high pressure (CO2), temperature and salinity conditions. A high pressure–temperature (P/T) optical cell with a regulated tilted surface was used to measure the advancing and receding contact angles at the desired conditions. The results showed that silica nanofluids can alte
... Show MoreThe topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore
... Show MoreThe popular Kurdish songs and games for children are among the simplest types that can be close to the child’s interest, because we estimate that this segment is limited by its meanings and goals charged with competition and the fall of its innate biological energies, in the early years of the stages of development and growth of human mental, psychological, and muscular skills, Passionate about knowing and discovering the general decree of life, and getting acquainted with the logical rulings that surround his new law, but instinctively it approaches everything that is simple in terms of understanding and palatability, as these games and songs are simple and easy in their melodic elements and elegance Conscious and kinetic are a
... Show MoreMixture experiments are response variables based on the proportions of component for this mixture. In our research we will compare the scheffʼe model with the kronecker model for the mixture experiments, especially when the experimental area is restricted.
Because of the experience of the mixture of high correlation problem and the problem of multicollinearity between the explanatory variables, which has an effect on the calculation of the Fisher information matrix of the regression model.
to estimate the parameters of the mixture model, we used the (generalized inverse ) And the Stepwise Regression procedure
... Show MoreAsset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques
... Show MoreCongenital anomalies commonly occur in humans, possibly visible. If these anomalies appear in visible parts in human body such as face, hands and feet. They may only appear after utilizing a number of special tests in order to show by means of the anomalies that occur in the internal organs of the body such as heart, stomach and kidneys.
Research data have comprised accessible information in the anomalies birth statistics form situated of Health and Life Statistics section at the Ministry of Health and environment, where the number of anomalies births involved in the study (2603 anomalies birth) in Iraq, except Kurdistan region, at 2015. A two way-response logistic regression analysis h
... Show MoreThis paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreB Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More