A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulneni, Dokan, Mauddud, Jawan/Mud, Batiwah, Shuaiba, Garagu, L.Sarmord). According to the property model, the model for each petrophysical property was constructed based on core data and CPI. By using the geostatistical method, the property model was constructed. The Mauddud Formation is considered one of the most promising hydrocarbon reservoirs in the Bai Hassan oil field based on the results of the property model, where the ratio of water saturation is around 30%, the porosity value is reaching up to 31%, and the net to gross ratio is averaging at 70%.
In this paper we have studied the optical properties of CuBr thin
films. Different sample thicknesses have been prepared by using thermal evaporation technique with 14.4 runlsec as the average deposition rate and 1 00°C as the substrate temperature.
In this paper , some of lexical stylistic , syntactical stylistic devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences. This paper aims at identifying the functions and the frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners
Tendon is important structure of the human body, since it can sustain tensile loading. The primary function of this tissue is to stabilize the joints they attached to it during daily activities. As well as, tendon has viscoelastic properties that can determine their response to loading and restrict the potential of injuries. One of the major points that this paper works with is the study of the biomechanical behaviour of tendon in response to tensile loading to describe their biological behaviour. Also, conclude the mathematical expression that may illustrate the tendon behaviour. All of the experiments were made in Physiology laboratories / Medical College/ Al- Nahrain University on ten rats "Rattus Norvegicus" of [108- 360] gm weight f
... Show MoreThe research gets its importance through the importance of the annual regulations in the taxation accounting and its efficiency to fulfill accounting justice under the effect of the financial changes and the truth of the activity of the taxable businesses .This through the problem of the research which is found in many objections about taxation accounting according to the annual regulations issued by the General Commission of Taxes , Their aim is to get the real benefits and to decrease the difference in opinions during the estimation to fulfill justice in distributing the burden of taxation .
The research expose many conclusions and recommendations namely , the taxation justice fulfillment is not only in justic
... Show MoreThe current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreDBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
Most systems are intelligent and the industrial world is moving now towards
technology. Most industrial systems are now computerized and offer a high speed.
However, Face recognition is a biometric system that can identify people from their
faces. For few number of people to be identified, it can be considered as a fast
system. When the number of people grew to be bigger, the system cannot be adopted
in a real-time application because its speed will degrade along with its accuracy.
However, the accuracy can be enhanced using pre-processing techniques but the
time delay is still a challenge. A series of experiments had been done on AT&TORL
database images using Enhanced Face Recognition System (EFRS) that is
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More