Preferred Language
Articles
/
mRbLGocBVTCNdQwCUDc0
Estimation of Initial Oil in Place for Buzurgan Oil Field by Using Volumetric Method and Reservoir Simulation Method
...Show More Authors

The estimation of the initial oil in place is a crucial topic in the period of exploration, appraisal, and development of the reservoir. In the current work, two conventional methods were used to determine the Initial Oil in Place. These two methods are a volumetric method and a reservoir simulation method. Moreover, each method requires a type of data whereet al the volumetric method depends on geological, core, well log and petrophysical properties data while the reservoir simulation method also needs capillary pressure versus water saturation, fluid production and static pressure data for all active wells at the Mishrif reservoir. The petrophysical properties for the studied reservoir is calculated using neural network technique from 13 cored and logged wells. The results showed that the reservoir simulation method gave a value of Initial Oil in Place that agrees and close to the value of Initial Oil in Place obtained from the volumetric method with a percentage different around 2%. However, the estimation of Initial Oil in Place by reservoir simulation method offered accurate results during good history matching with observed data as well as making appropriate adjusting for Pc vs. Sw values for the whole reservoir from October 1976 until December2020. MB21 unit own most Initial Oil in Place equal to 525*106 SM3 while MB12 has lowest IOIP equal to 2*106 SM3. Finally, the calculation of Initial Oil in Place by both volumetric and simulation methods presented good results while comparing with previous study at 2013 with discovered different around 1.5% and 0.6% respectively.

Scopus Crossref
View Publication
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cost Management of construction industries according to the fast-track method
...Show More Authors

Construction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the

... Show More
View Publication Preview PDF
Publication Date
Sun May 11 2025
Journal Name
Journal Of Information Systems Engineering And Management
The Effect of the Learning Mastery Strategy using Interactive Learning Techniques as a Therapeutic Method on the Achievement of Secondary School Students in Mathematics
...Show More Authors

  The current research aims to identify the effect of the learning mastery strategy using interactive learning as a therapeutic method on the achievement of secondary school students in mathematics. To achieve the research objective, the researcher selected second-grade middle school students at Al-Haybah Intermediate School for Boys and determined his research sample, which consisted of (77) students distributed into two sections: Section (A) the experimental group, with (38) students, and Section (B) the control group, with (39) students. The statistical equivalence of the two research sample groups was confirmed in the variables (intelligence test, previous achievement, and previous knowledge test). The researchers chose the par

... Show More
View Publication
Crossref
Publication Date
Thu May 03 2018
Journal Name
Online Journal Of Veterinary Research
Effect of Cutibacterium acnes cell free antigen (CFAg) immunization, levofloxacin and cinnamon oil on Cutibacterium acnes infection in rabbits
...Show More Authors

Tuaimah GS, AQ Al-Awadi, Ahmed ME., Effect of Cutibacterium acnes cell free antigen (CFAg) immunization, levofloxacin and cinnamon oil on Cutibacterium acnes infection in rabbits, Onl J Vet Res., 22 (9):811-822, 2018. C. acnes causes acne vulgaris most commonly in 12-24 year olds. Five albino rabbits were immunized at day 1 and 14 with Cutibacterium acnes cell free antigen (CFAg) and then infected intradermally with 0.1 ml C. acnes suspension (2×108 cfu/ml) at day 30. Two groups of five infected rabbits were then treated at Day 30 with 0.5% levofloxacin or 0.2% cinnamon oil twice daily for 12 days. Five control rabbits were infected intradermally with 0.1 ml 2×108 cfu/ml Cutibacterium acnes n (2×108 cfu/ml). At day 42, skin test (mm), se

... Show More
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 30 2016
Journal Name
International Business Management
ESTIMATE OF THE MULTIPLIER EFFECT OF THE MONETARY AND FISCAL POLICY ON NON-OIL GROSS DOMESTIC PRODUCT IN THE IRAQI ECONOMY FOR THE PERIOD OF 1990-2014
...Show More Authors

The monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to

... Show More
Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Silver nanoparticles synthesized by three species of genus Streptococcus and evaluate their synergistic effects with the oil extracted from Syzygium Aromaticum on some clinical bacterial isolates
...Show More Authors

Silver nanoparticles synthesized by different species

Publication Date
Wed Jan 01 2014
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays Reaction 32 70 70 33 Ge p n As (, ) γ Using a2-ratio Method.
...Show More Authors

The δ-mixing of γ-transitions in 70As populated in the 32 70 70 33 Ge p n As (, ) γ reaction is calculated in the present work by using the a2-ratio methods. In one work we applied this method for two cases, the first one is for pure transition and the sacend one is for non pure transition, We take into account the experimental a2-coefficient for previous works and δ -values for one transition only.The results obtained are, in general, in a good agreement within associated errors, with those reported previously , the discrepancies that occur are due to inaccuracies existing in the experimental data of the previous works.