A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has been divided into 85 sublayers in the vertical direction and 170*143 grid cells in the x-y direction, totalling 2,066,350 grid cells. The Sequential Gaussian Simulation technique is used to fill 3D grid cells with property values in locations far from wells after upscaling the well log data, then distributed across all reservoir zones. The standard original oil in place has been calculated, uncertainty evaluation was used to obtain more accurate results. Model Risk Analysis employs Monte Carlo Simulation to generate the pessimistic, most likely, and optimistic reserve values (P90, P50, and P10). The uncertainty was affected by the oil formation volume factor, oil depth, petrophysical model (porosity, water saturation, and NTG), and reservoir geometric structure (horizons and zones).
After the spread of the function of the scenographer in the modern theater, his vision has become present in most of the theatrical works and because the director is the master of the work and the owner of the vision that appears in front of the audience, the overlap between the visions of each of them was required. This research is an attempt to detect the overlap and disengagement in the work of each of them.
The research is divided into a methodological framework that included the research problem, importance, limits, and purpose, and then the definition of terms. In the theoretical framework, the research dealt with two theoretical sections that pave the way for raising ideas related to this subject: the first section (scenography
In this paper has been building a statistical model of the Saudi financial market using GARCH models that take into account Volatility in prices during periods of circulation, were also study the effect of the type of random error distribution of the time series on the accuracy of the statistical model, as it were studied two types of statistical distributions are normal distribution and the T distribution. and found by application of a measured data that the best model for the Saudi market is GARCH (1,1) model when the random error distributed t. student's .
The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas
... Show MoreIntroduction/Aim. Rhabdomyosarcoma (RMS) is the most common soft tissue sarcoma in pediatric population and adolescents. Limited data is available on the characteristics of RMS in Iraqi pediatric patients. The aim of the study was to examine the clinical and histological aspects of RMS in Iraqi children, with a focus on their response to treatment, prognosis, and survival. Methods. A retrospective cohort study was conducted at the Oncology Unit of Children's Welfare Teaching Hospital, Medical City, Baghdad, Iraq and included patients who were newly diagnosed with RMS and received treatment during the period between January 1, 2015, and December 31, 2019. The patients were followed up from the time of diagnosis until October 1, 2020.
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreThe study included three topics, the definition of the personality of Imam al-Bazazi, his scientific biography, his elders, his writings, his students and his death, selected issues of his weightiness related to purity, and the Imam al-Bazazi is Muhammad ibn Muhammad ibnShihabibn Yusuf, known in al-Kardari al-Hanafi al-Balzazi. The other doctrines, the author relied in his book on the sources of the previous scholars of the Hanafis, and make them the basis in his book, the author did not adopt the definitions of language and terminology, and rarely mention the evidence Shariah adopted by scientists in their opinions, and limited to mention only opinions, In front of the first issue spotlessly water user, and the second issue that sleep l
... Show More