A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has been divided into 85 sublayers in the vertical direction and 170*143 grid cells in the x-y direction, totalling 2,066,350 grid cells. The Sequential Gaussian Simulation technique is used to fill 3D grid cells with property values in locations far from wells after upscaling the well log data, then distributed across all reservoir zones. The standard original oil in place has been calculated, uncertainty evaluation was used to obtain more accurate results. Model Risk Analysis employs Monte Carlo Simulation to generate the pessimistic, most likely, and optimistic reserve values (P90, P50, and P10). The uncertainty was affected by the oil formation volume factor, oil depth, petrophysical model (porosity, water saturation, and NTG), and reservoir geometric structure (horizons and zones).
Objective(s): The study aims Finding relationship between UTI and demographic variable include: child's age, child's gender, if males are circumcised or not, child's order in his family, father's level of education, mother's level of education, place of residence and family socioeconomic status. Methodology: A descriptive study was conducted on students of primary schools for both sexes, for the period from 19th. February 2014 through to 4th March 2014. A selected sample from two steps the first stage is to choose a school by a stratified- cluster sample, getting schools that have been selected (12) sch
In this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
This study is aimed to Green-synthesize and characterize Al NPs from Clove (Syzygium aromaticum
L.) buds plant extract and to investigate their effect on isolated and characterized Salmonella enterica growth.
S. aromaticum buds aqueous extract was prepared from local market clove, then mixed with Aluminum nitrate
Al(NO3)3. 9 H2O, 99.9% in ¼ ratio for green-synthesizing of Al NPs. Color change was a primary confirmation
of Al NPs biosynthesis. The biosynthesized nanoparticles were identified and characterized by AFM, SEM,
EDX and UV–Visible spectrophotometer. AFM data recorded 122nm particles size and the surface roughness
RMs) of the pure S. aromaticum buds aqueous extract recorded 17.5nm particles s
Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More