The Khabour reservoir, Ordovician, Lower Paleozoic, Akkas gas field which is considered one of the main sandstone reservoirs in the west of Iraq. Researchers face difficulties in recognizing sandstone reservoirs since they are virtually always tight and heterogeneous. This paper is associated with the geological modeling of a gas-bearing reservoir that containing condensate appears while production when bottom hole pressure declines below the dew point. By defining the lithology and evaluating the petrophysical parameters of this complicated reservoir, a geological model for the reservoir is being built by using CMG BUILDER software (GEM tool) to create a static model. The petrophysical properties of a reservoir were computed using the notion of hydraulic units, and there are a number of basic steps to building a geological model, beginning with the creation of a single well model and then moving on to the distribution of properties. Depending on the variance in petrophysical parameters, the reservoirs were separated into seven zones. The Ordovician Formation (Khabour Formation) is penetrated by well Akk-1, which is included in the single well geological model to focus on studying the impact of gas condensate on gas production. The prediction of gas condensate wells production will strongly depend on oil banking evaluation and modeling. For this reason, well Akk-1 was chosen to build the model. Upper and lower sandstone units characterized as the most important due to containing of gas. The cost and risk to develop these reservoirs under severe conditions of pressure and temperature highlight the need to be able to confidently predict the recovery of gas and liquid drop-outs from Khabour reservoirs so, it is so necessary to predict the cost of this step in another paper
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreOperated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took joi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .
Primary productivity and chlorophyll-a were used in this study to monitor the restoration process of southern Iraqi marshes (Al-Hewaizeh, central marshes, and Al-Hammar). The phytoplankton primary productivity was based on oxygen light/dark bottle method. Two different depths samples were taken monthly from six studied marshes stations (two stations for each marsh) during November 2005 to October 2006, while chlorophyll-a samples taken from surface water. The phytoplankton primary productivity values ranged 9.38 – 249.79 mg C/m3.hr for all marshes, its values for surface water sample ranged 11.71 – 256.24 mg C/m3.hr, while for 1m depth ranged 9.38 – 142.5 mg C/m3.hr. Chlorophyll-a values ranged between (1.1 – 21.26) µg/l indicating
... Show MoreAbstract
Target costing and cleaner production are among the most important techniques in the field of cost and management accounting, which, when integrated, enable economic units to achieve the goal of cost management by reducing it by calculating cost more accurately than traditional methods.To achieve this, the researcher relied on the inductive approach in writing the theoretical framework for the research, relying on foreign and Arabic books, dissertations and university theses, foreign and Arabic research and periodicals related to the subject of the research, and relying on the descriptive and analytical approach in
... Show MoreIn this research, has been to building a multi objective Stochastic Aggregate Production Planning model for General al Mansour company Data with Stochastic demand under changing of market and uncertainty environment in aim to draw strong production plans. The analysis to derive insights on management issues regular and extra labour costs and the costs of maintaining inventories and good policy choice under the influence medium and optimistic adoption of the model of random has adoption form and had adopted two objective functions total cost function (the core) and income and function for a random template priority compared with fixed forms with objective function and the results showed that the model of two phases wit
... Show MoreMicroorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and Candida. C.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro
... Show MoreThe working of the some designer was recognize by the Production and introduction of the design which have special stemp and style determind by the experience and the Knowledge ability for the Designer which change the ordinaries shape to the develops shaps bening ideas and new meanings un known to the viewen make the design at high level of creative and the designer acquest experiennce and new skill in his way for the designs and the art march-out which clearly demonstrate on all the graphical work so the high research conserned on the knowledge and detect about the methods constructing of the ability and expernence for the graphic designer become it is decisive worker in effective or net effective the designers work and any consist whi
... Show MoreAbstract :
The study aims at building a mathematical model for the aggregate production planning for Baghdad soft drinks company. The study is based on a set of aggregate planning strategies (Control of working hours, storage level control strategy) for the purpose of exploiting the resources and productive capacities available in an optimal manner and minimizing production costs by using (Matlab) program. The most important finding of the research is the importance of exploiting during the available time of production capacity. In the months when the demand is less than the production capacity available for investment. In the subsequent months when the demand exceeds the available energy and to minimize the use of overti
... Show More