A common field development task is the object of the present research by specifying the best location of new horizontal re-entry wells within AB unit of South Rumaila Oil Field. One of the key parameters in the success of a new well is the well location in the reservoir, especially when there are several wells are planned to be drilled from the existing wells. This paper demonstrates an application of neural network with reservoir simulation technique as decision tool. A fully trained predictive artificial feed forward neural network (FFNNW) with efficient selection of horizontal re-entry wells location in AB unit has been carried out with maintaining a reasonable accuracy. Sets of available input data were collected from the exploited grids and used in the training and testing of the used network. A comparison between the calculated and observed cumulative oil production has been carried out through the testing steps of the constructed ANN, an absolute average percentage error of the used network was reached to 4.044%, and this is consider to be an acceptable limit within engineering applications, in addition to that, a good behavior was reached with (FFNNW) and suitable re-entry wells location were identified according to the reservoir configuration (pressure and saturation distribution) output from SRF simulation model at the end of 2005.
This study has been carried out in the Station of Poultry Researches which is affiliated to the General Office of Agricultural Researches / Ministry of Agriculture during the period from 25/02/2019 to 08/04/2019 (42)days .Five hundred unsexed one day old chick of type (Ross 308) used in this study, and has been fed on diets which oleuropeinin has been added to it with the levels 2,2.5,3 and3.5 g/kg as a feed for the treatments T2 , T3 , T4 and T5 respectively and compared to the control treatment T1 which is devoid of addition, every treatment included Four replicates each one has 25 birds in order to study the effect of adding a various levels of oleuropein into the diet on the production and physiological performance for broilers. The res
... Show MoreLinguistic taboos exist in most cultures. Tabooed words are generally being culturespecific
and relating to bodily functions or aspects of a culture that are sacred. Such words are
avoided, considered inappropriate and loaded with affective meaning and failing to adhere to.
Strict rules, often, governing their use and lead to punishment or public shame. These taboo
words can be used as a way of violating social deixis represented by four types of honorifics;
addressee, referent, bystander, and finally setting honorifics. This paper shows how these
taboo words are used in Kenneth Bernard's play La Justice or The Cock that Crew from the
theatre of the Ridiculous as means of violating social deixis in its four types. Th
Suzanne Collins’ novel The Hunger Games suggests a new logic of victory and set a distinguished focus on the unique personality of her heroin which brings to the mind the permanent correlation between all moral values. The Hunger Games World seems to be much more like one big bowl as it links the past, present, and the future. An Intertextual reference is interwoven in the present research as it brings Golding’s Lord of the Flies to the surface, and it highlights certain similarities between the two texts. In which Ralph, Piggy and Simon in Golding’s Lord of the Flies are the incarnations of stable moral values and hope of surviving ethics and rules in a chaotic and turmoil world. The event
... Show MoreThe current research aims to determine the requirements of Trends of International Mathematics and Science Study (TIMSS 2019) and to find out the extent to which the content of science textbooks for grades (1-4) in the Sultanate of Oman includes the requirements of (TIMSS 2019). Only the content dimension has been taken into account when conducting the content analysis. The study population includes all science books from the first to the fourth grade for the academic year 2021-2022. The study identified and organized the requirements in the study tool, which is a list of requirements of (TIMSS 2019). The results showed a general deficiency in all grades (1-4) in the content dimension including many main topics, subtopics, and objectives
... Show MoreThis research aims at shedding light on the concept of insurance awareness and clarifying its role on marketing insurance services of a sample of (100) employees in the National Company for Insurance. Questionnaire is used as a main instrument for collecting data and information from the sample. Their answers were analyzed by using arithmetic means, standard deviation, centesimal weight, and the correlation coefficient ( , F, t) tests .The research reached several conclusions of which:1.The sample member's response to insurance awareness and marketing insurance services factors was in the medium level.2.There was a positive relationship of a moral sign between insurance awareness and marketing insurance services, that correlation coeffic
... Show MoreBackground: Tear of MCL of the knee is a frequent problem among knee ligaments injuries.Injuries to the MCL are usually caused by contact on the outside of the knee and are accompanied by sharp pain on the inside of the knee. Contrary to most other knee ligaments the medial collateral ligament (MCL) has an excellent ability to heal, being fairly large and well vascularised structure. The vast majority of isolated medial ligament injuries heal without significant long-term problems
Objectives: is to compare between the early clinical examination, and assessment under general anesthesia (GA), and to find out the best methods to assess the MCL tear especially in suspected cases.
Type
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More