Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with hydrocarbons. The structural and petrophysical models were built based on data gathered from five oil wells. The data from the available well logs, including RHOB, NPHI, SONIC, Gamma-ray, Caliper, and resistivity logs, was used to calculate the petrophysical properties. These logs were analyzed and corrected for environmental factors using IP V3.5 software. where the average formation water resistivity (Rw = 0.04), average mud filtrate resistivity (Rmf = 0.06), and Archie's parameters (m = 2, n = 1.9, and a = 1) were determined. The well-log data values calculated the porosity, permeability, water saturation, and net-to-gross thickness ratio (N/G).
Locking of the knee is a one of the commonest orthopedic outpatient presentation. This patient usually need magnetic resonance imaging (MRI) when there is suspected lesion in the soft tissue clinically. Meniscal tears is the first differential diagnosis when accompany with painful knee. (1, 2)
Giant cell tumor (GCT) is benign a localized nodular tenosynovitis often occur in the tendon sheath , Mostly involve the hand tendons in middle age group between 30 and 50 years old , female affect more than male.(3,4) The WHO defines two well-known kinds of giant cell tumor: (1) pigmented villonodular synovitis ( generalized type), which mainly involve the joints of the lower limb and (2) giant cell tumor of the tendon sheath ( localized type)
نحو تعزيز المشاركة السياسية للطالبات الجامعيات الفلسطينيات
In this research, we discussed and analyzed the relationship between oil prices and the U.S. dollar exchange rate in Iraq. The study adopted the descriptive analysis and econometrics analysis. The descriptive analysis refers to the rise (fall) in crude oil price lead to appreciate (depreciate) in the Iraqi dinar exchange rate, though the channel of the international reserves. The econometrics analysis is based on monthly data covered the period (December/2002 – December/2011), the unit root test, co-integration test, vector error correction model, and Granger causality test have been adopted in this research to check the existence and direction of this relationship. The results refer to the lon
... Show MoreThe need for detection and investigation of the causes of pollution of the marshes and submit a statistical study evaluated accurately and submitted to the competent authorities and to achieve this goal was used to analyze the factorial analysis and then obtained the results from this analysis from a sample selected from marsh water pollutants which they were: (Electrical Conductivity: EC, Power of Hydrogen: PH, Temperature: T, Turbidity: TU, Total Dissolved Solids: TDS, Dissolved Oxygen: DO). The size of sample (44) sites has been withdrawn and examined in the laboratories of the Iraqi Ministry of Environment. By illustrating SPSS program) the results had been obtained. The most important recommendation was to increase the pumping of addit
... Show MoreOpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for ad
... Show MoreThe useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Experimental activity coefficients at infinite dilution are particularly useful for calculating the parameters needed in an expression for the excess Gibbs energy. If reliable values of γ∞1 and γ∞2 are available, either from direct experiment or from a correlation, it is possible to predict the composition of the azeotrope and vapor-liquid equilibrium over the entire range of composition. These can be used to evaluate two adjustable constants in any desired expression for G E. In this study MOSCED model and SPACE model are two different methods were used to calculate γ∞1 and γ∞2
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More