Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with hydrocarbons. The structural and petrophysical models were built based on data gathered from five oil wells. The data from the available well logs, including RHOB, NPHI, SONIC, Gamma-ray, Caliper, and resistivity logs, was used to calculate the petrophysical properties. These logs were analyzed and corrected for environmental factors using IP V3.5 software. where the average formation water resistivity (Rw = 0.04), average mud filtrate resistivity (Rmf = 0.06), and Archie's parameters (m = 2, n = 1.9, and a = 1) were determined. The well-log data values calculated the porosity, permeability, water saturation, and net-to-gross thickness ratio (N/G).
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreIt has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlight
... Show MorePsychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreNew polydentate ligand namely bis(N-carboxylatoethyl)-0,0`-dipyridinium) L was synthesised from the reaction of 0,0`-dipyridine with ethyl chloropropionate. Polymeric complexes of general formulae [Cr2(L)(N3)0]Cl2.H2O, Na2[Ag2(L)(N3)0].H2O and [M2(L)(N3)0].nH2O, where (M= Mn(II), Fe(II), Co(II), Ni(II), Cu(II), Zn(II) and Cd(II); (where n = 2;1;1;1;4;1 and 1, respectively)) are reported. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectroscopic methods. These studies revealed octahedral geometry complexes. Molecular structure for the complexes has been optimised by CS Chem 3D Ultra Molecular Modelling and Analysis Program and supported a six coordinate geometry.
Pseudomonas aeruginosa is a Gram-negative opportunistic pathogen and a model bacterium for studying virulence and bacterial social traits. While it can be isolated in low numbers from a wide variety of environments including soil and water, it can readily be found in almost any human/animal-impacted environment. It is a major cause of illness and death in humans with immunosuppressive and chronic conditions, and infections in these patients are difficult to treat due to a number of antibiotic resistance mechanisms and the organism’s propensity to form multicellular biofilms. One hundred twenty clinical samples and forty hospital environmental samples (various sources) were collected from hospitals in Baghdad city during the period from Oc
... Show MoreThe synthesis of ligands with N2S2 donor sets that include imine, an amide, thioether, thiolate moieties and their metal complexes were achieved. The new Schiff-base ligands; N-(2-((2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio)-acetamide (H2L1) and N-(2-((2,4-di-p-tolyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio) acetamide (H2L2) were obtained from the reaction of amine precursors with 1,4-dithian-2-one in the presence of triethylamine as a base in the CHCl3 medium. Complexes of the general formula K2[M(Ln)Cl2], (where: M = Mn (II), Co(II) and Ni(II)) and [M(Ln)], (where: M = Cu(II), Zn(II) and Cd(II); n =1-2, expect [Cu(HL2)Cl]) were isolated. The entity of ligands and
... Show MoreWater scarcity, rising energy costs, and declining irrigation efficiency are significant barriers to wheat production in Iraq. This study evaluates the economic, environmental, and sustainability impacts of integrating artificial intelligence (AI) into irrigation management under semiarid conditions. Field experiments conducted at the Al‐Ra'id Research Station in Baghdad during the 2025 season compared conventional diesel‐based irrigation with AI‐assisted irrigation that used soil moisture sensors, Internet of Things (IoT) controllers, and predictive weather algorithms. The analysis employed Cobb–Douglas production modeling, cost–benefit analysis, net
Occupy public investment spending, a great deal of attention since the thirties of the last century, to play important role in economic and social development process and therefore most of the countries are trying different degree of economic development to the completion of the largest amount of public investment, especially in infrastructure, which is one of the pillars essential to economic development, and in order to maximize utilization of the completion of public investment should focus on achieving efficiency in completion.
The current reality of public projects in Iraq, indicating the absence of several key characteristics that must be provided if these proje