Preferred Language
Articles
/
0hYeSYsBVTCNdQwCmMih
Development of 3D Geological Model and Analysis of the Uncertainty in a Tight Oil Reservoir in the Halfaya Oil Field
...Show More Authors

A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has been divided into 85 sublayers in the vertical direction and 170*143 grid cells in the x-y direction, totalling 2,066,350 grid cells. The Sequential Gaussian Simulation technique is used to fill 3D grid cells with property values in locations far from wells after upscaling the well log data, then distributed across all reservoir zones. The standard original oil in place has been calculated, uncertainty evaluation was used to obtain more accurate results. Model Risk Analysis employs Monte Carlo Simulation to generate the pessimistic, most likely, and optimistic reserve values (P90, P50, and P10). The uncertainty was affected by the oil formation volume factor, oil depth, petrophysical model (porosity, water saturation, and NTG), and reservoir geometric structure (horizons and zones).

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Overlap of Visions between the Scenographer and the Director in the Theatrical Show
...Show More Authors

After the spread of the function of the scenographer in the modern theater, his vision has become present in most of the theatrical works and because the director is the master of the work and the owner of the vision that appears in front of the audience, the overlap between the visions of each of them was required. This research is an attempt to detect the overlap and disengagement in the work of each of them.
The research is divided into a methodological framework that included the research problem, importance, limits, and purpose, and then the definition of terms. In the theoretical framework, the research dealt with two theoretical sections that pave the way for raising ideas related to this subject: the first section (scenography

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 15 2025
Journal Name
Al-rafidain University College For Sciences
Use GARCH model to predict the stock market index, Saudi Arabia
...Show More Authors

In this paper has been building a statistical model of the Saudi financial market using GARCH models that take into account Volatility in prices during periods of circulation, were also study the effect of the type of random error distribution of the time series on the accuracy of the statistical model, as it were studied two types of statistical distributions are normal distribution and the T distribution. and found by application of a measured data that the best model for the Saudi market is GARCH (1,1) model when the random error distributed t. student's .

View Publication Preview PDF
Publication Date
Wed Jan 13 2021
Journal Name
Egyptian Journal Of Chemistry
Development of a nanostructured double-layer coated tablet based on polyethylene glycol/gelatin as a platform for hydrophobic molecules delivery
...Show More Authors

The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Acta Facultatis Medicae Naissensis
Rhabdomyosarcoma in children in the five-year period in Oncology Unit in a pediatric Teaching Hospital
...Show More Authors

Introduction/Aim. Rhabdomyosarcoma (RMS) is the most common soft tissue sarcoma in pediatric population and adolescents. Limited data is available on the characteristics of RMS in Iraqi pediatric patients. The aim of the study was to examine the clinical and histological aspects of RMS in Iraqi children, with a focus on their response to treatment, prognosis, and survival. Methods. A retrospective cohort study was conducted at the Oncology Unit of Children's Welfare Teaching Hospital, Medical City, Baghdad, Iraq and included patients who were newly diagnosed with RMS and received treatment during the period between January 1, 2015, and December 31, 2019. The patients were followed up from the time of diagnosis until October 1, 2020.

... Show More
View Publication
Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
DOUBLE DIFFUSIVE FREE CONVECTION IN A PACKED BED SQUARE ENCLOSURE BY USING LOCAL THERMAL NON-EQUILIBRIUM (LTNE) MODEL
...Show More Authors

In the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Imams al-Imam al-Bazazi (AH827) in his book al-Fatawi al-Bazazi issues purity is a model
...Show More Authors

The study included three topics, the definition of the personality of Imam al-Bazazi, his scientific biography, his elders, his writings, his students and his death, selected issues of his weightiness related to purity, and the Imam al-Bazazi is Muhammad ibn Muhammad ibnShihabibn Yusuf, known in al-Kardari al-Hanafi al-Balzazi. The other doctrines, the author relied in his book on the sources of the previous scholars of the Hanafis, and make them the basis in his book, the author did not adopt the definitions of language and terminology, and rarely mention the evidence Shariah adopted by scientists in their opinions, and limited to mention only opinions, In front of the first issue spotlessly water user, and the second issue that sleep l

... Show More
View Publication Preview PDF