This research was aimed to determine the petrophysical properties (porosity, permeability and fluid saturation) of a reservoir. Petrophysical properties of the Shuiaba Formation at Y field are determined from the interpretation of open hole log data of six wells. Depending on these properties, it is possible to divide the Shuiaba Formation which has thickness of a proximately 180-195m, into three lithological units: A is upper unit (thickness about 8 to 15 m) involving of moderately dolomitized limestones; B is a middle unit (thickness about 52 to 56 m) which is composed of dolomitic limestone, and C is lower unit ( >110 m thick) which consists of shale-rich and dolomitic limestones. The results showed that the average formation water resistivity for the formation (Rw = 0.021), the average resistivity of the mud filtration (Rmf = 0.57), and the Archie parameters determined by the picket plot method, where m value equal to 1.94, n value equal to 2 and a value equal to 1. Porosity values and water saturation Sw were calculated along with the depth of the composition using IP V3.5 software. The interpretation of the computer process (CPI) showed that the better porous zone holds the highest amount of hydrocarbons in the second zone. From the flow zone indicator method, there are four rock types in the studied reservoir.
The proposed work is an attempt to investigate the stability of the nonlinear system by using a whale optimization algorithm as of one of the meta-heuristic optimization methods, and this investigation was conducted on a single inverted pendulum as a study model. The evaluation measures which were used in this article values of gain and sliding surface of the conventional sliding mode controller to illustrate the extent of the system`s stability. Furthermore, control action, the relationship between error and its derivative, desired, and actual position in addition to sliding response graphically showed the feasibility of the proposed solution. The attained results illustrated considerable improvement in the settling time and minimizing the
... Show MoreBackground: An accurate adaptation of the crown to the finish line is essential to minimize cement dissolution and to preserve periodontium in fixed partial denture cases. An accurate adaptation of crown is possible only when preparation details are captured adequately in the impression and transferred to cast. For these reasons, gingival displacement is necessary to capture subgingival preparation details.The aim of the present study is to measure in vivo the horizontal displacement of the gingival sulcus obtained by using three new cordless retraction materials (Magic Foam Cord®, Racegel and Astringent Retraction Paste) in comparison to medicated retraction cord. Materials and method: Thirty-two patients requiring porcelain fused to me
... Show MoreBackground: Pit and fissure sealant have been considered an outstanding adjunct to oral health care in the decrease of occlusal caries onset and low progression. The aims of this in vitro study were to evaluate the marginal microleakage of three different types of fissure sealants (SDI, Tg and tetric N-flow) by time interval, one day and 45 days, in the presence or absence of bonding agent among maxillary and mandibular teeth. Materials and methods: Seventy two sound human maxillary and mandibular first premolar teeth were collected which were free from obvious carious lesions. The teeth were randomly divided into two main equal groups, group (1) and group (2), each group consists of (36) teeth involving equal numbers of maxillary and mandi
... Show MoreBig developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological, and the cost accounting has benefited from this technology to development its goals in the regulatory process through the use of non-destructive evaluation perspective in carrying out its functions and to provide appropriate assistance for the use of the products, which were traditional accounting does not take them into consideration. The research aims to a statement that the u
... Show MoreThe Makhoul Dam project proposed to be established is considered one of the strategic projects in Iraq as it works to insurance large quantity of water spare in flood seasons, increase the storage capacity of the dams in Iraq, as well as increase food security. The Makhool Dam is located on Tigris River in Salah al-Din Governorate, and 8 km south of the meeting point of the Tigris River with the Lower Zab River. The lake area is about 256 km2. In this research, a mathematical model was prepared by using HEC-RAS Two Dimension Software to analyze the velocity patterns and water depths inside makhool dam reservoir at the highest operational water elevation, based on the designs prepared
In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More