Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology identification, M-N cross plots (also known as Litho-porosity cross plots) for mineral identification, and Matrix identification (MID) plots. Neutron-density cross plots show that the Mishrif formation consists of limestone with some data points tending to the dolomite line east of the field and to the sandstone line west of the field. The M-N and MID plots indicate that calcite is the major mineral for the Mishrif formation; however, quartz grows to the west of the area while dolomite increases to the east. These findings underscore the importance of integrating multiple well-log interpretation techniques to capture lithologic and mineralogical complexity, providing critical insights for reservoir management and targeted exploitation strategies in heterogeneous carbonate systems.
Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreIn the present work the clathrate hydrate dissociation enthalpies of refrigerant R134a+ water system, and R134a + water + salt system were determined. The heat of dissociation of three types of aqueous salts solutions of NaCl, KBr and NaF at three concentrations (0.09, 0.17and 0.26) mol·kg−1 for each salt type, were enthalpy measured. The Clapeyron equation was used tocalculate heat of dissociation of experimental data for binary and ternary system.In order to find the effect of compressibility factor on heat dissociation enthalpy, the study was conducted by using equation of state proposed by Peng and Robinson Stryjek-Vera (PRSV). The obtained results of dissociation enthalpy for binary system were (143.8) kJ.mol-1
... Show MoreThe current research is concerned with the prices of Goods and materials in the Iraqi slang a descriptive, lexicographic , and semantic study expressing the meanings of these names and their positions , as well as expressing the imaginations of Human mind , the popular mind in describing these goods with evaluating them besides the semantic of each word accordingly
The current research is divided into two parts , the first part is consisted of Vocalizations" words" That are arisen through cognitive naming that concentrate on the mental imaginations for the most important and sensitive such as colors , taste , shapes and forms impacts of Goods and materials according to users' ' taste for those words , on other hand, the second part of
This research aims to develop transdermal patches of Ondansetron hydrochloride (OSH) with different types of polymers, ethyl cellulose and, polyvinyl pyrrolidone k30 in a ratio (3:0.5,3:1,3:2,2:1,1:1) with propylene glycol 20%w/w as a plasticizer. Prepared transdermal patches were evaluated for physical properties. The compatibility between the drug and excipients was studied by Differential scanning calorimetry (DSC), where there is no interaction between the drug and polymers. From the statistical study, there is a statistical difference between all the prepared formulations p<0.05. In-vitro Release study of transdermal patches was performed by using a paddle over the disc. The release profile of OSH follow
... Show MoreMercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show Moreobjective : To assess for Psychological Problems. The study was carried out from 1st of December 2004 to 15th
March, 2005.
Mythology : A descriptive comparative study was conducted for elder in the geriatric home and the community;
A questionnaire was constructed to achieve the purposes of the study; it includes two parts dealing with the
elder demographic characteristics and psychological problems.
A purposive (no probability) sampling of (100) elderly include (50) elderly from the Geriatric Home and (50)
elderly from the community.
Data were collected and analyzed through a descriptive statistical approach (frequency, percentage, mean and
mean of scores, Standard deviation, Relative Sufficiency).
Result : the