The Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, a
... Show MoreThe Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, and
... Show More
Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.
Then:
Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of inf
... Show MoreThe telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce
... Show MoreApplying a well-performing heat exchanger is an efficient way to fortify the relatively low thermal response of phase-change materials (PCMs), which have broad application prospects in the fields of thermal management and energy storage. In this study, an improved PCM melting and solidification in corrugated (zigzag) plate heat exchanger are numerically examined compared with smooth (flat) plate heat exchanger in both horizontal and vertical positions. The effects of the channel width (0.5 W, W, and 2 W) and the airflow temperature (318 K, 323 K, and 328 K) are exclusively studied and reported. The results reveal the much better performance of the horizontal corrugated configuration compared with the smooth channel during both melti
... Show MoreThere are many studies that discussed the famous museum's graveyards in the Islamic worlds, to study the lives of these figures, there are many difficulties for their studies because the first we need the regularity and history information, and many sciences support, such as in language, geography information.
I am studying the research from Maraqid Al-Maaraf book by Harz Aldeen, the book has large members about the persons have graved in Persian Country in the middle ages, there are more than (30) figures in my study, I have studied every figure in this research depending on the sources and references books.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
ABSTRACT
The research aim is to determine the relation between governmental consumption expenditure (GCE) & GDP in Iraq for the period 1981-2006.
The research has determined the scale of optimization for (GCE) & try to know the extent productivity of this expenditure and using the long run &short run model to test .The results clarify the following
1-The marginal productivity for the (GCE) is positive so it is productive.
2-The (GCE) in Iraq is too high because the marginal productivity for the expenditure less than 1.
3- The (GCE) percentage to GNP is
... Show More