The lower Cretaceous sandstones of Zubair and Nahr Umr formations are the main producing reservoirs in Subba oilfield in southern Iraq. Key differences in their petrophysical and depositional attributes exist affecting their reservoir characteristics. The evaluation of well logs and core porosity-permeability data show better reservoir properties in Nahr Formation. The Litho-saturation logs indicate greater thickness of oil-saturated reservoir units for Nahr Unr Formation associated with lower values of shale volume, and higher values of effective porosity. In addition, higher values of permeability for Nahr Umr Formation is suggested by applying porosity-irreducible water saturation cross plot. The reducing reservoir quality of Zubair Formation sandstones is related to finer grains of sandstone reservoirs, higher clay volume, and more effect of compaction resulting from greater depth. A reservoir layering scheme is proposed by sequence stratigraphic analysis leading to the identification of systems tracts and their key surfaces within Zubair and Nahr Umr formations, and forms the basis for predicting of reservoir architecture and quality. Laterally continuous, and thick amalgamated sandstone reservoirs are formed during highstand systems tract in Nahr Umr Formation as a result of low accommodation/sediment supply conditions. Within the transgressive systems tract of Zubair Formation, the sandstone reservoir bodies become isolated as accommodation exceeds sediment supply.
Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exp
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe aim of the research was to prepare Pilates exercises using the barrel ladder apparatus and to identify the effect of Pilates exercises on agility, coordination, and motor sequences of third-year female students in artistic gymnastics. The researcher adopted the experimental method to achieve the objectives of the study and to verify its hypotheses, as it is suitable for the nature and problem of the research. In selecting the research population, the researcher carefully chose the sample using a purposive method, clarifying its elements and constituent units. The research population consisted of third-year female students at the College of Physical Education and Sports Sciences for Women / University of Baghdad, with a total of 20 stud
... Show MoreKnowledge of permeability, which is the ability of rocks to transmit the fluid, is important for understanding the flow mechanisms in oil and gas reservoirs.
Permeability is best measured in the laboratory on cored rock taken from the reservoir. Coring is expensive and time-consuming in comparison to the electronic survey techniques most commonly used to gain information about permeability.
Yamama formation was chosen, to predict the permeability by using FZI method. Yamama Formation is the main lower cretaceous carbonate reservoir in southern of Iraq. This formation is made up mainly of limestone. Yamama formation was deposited on a gradually rising basin floor. The digenesis of Yamama sediments is very important due to its direct
Background: The aim of this in vitro study was to evaluate and compare the microleakage between Vertise Flow T M composite material and other conventional (Filtek Z250, riva light cure and SDR) composite materials when restoring CII mesial box only cavity at gingival margin through die penetration test Materials and methods: Forty maxillary first premolars were prepared with class II box design only cavities. Samples were divided into four groups of ten teeth according to material used: group I (FiltekZ250 only). Group II (SDR+FiltekZ250). Group III (Vertise Flow +FiltekZ250). Group IV (Riva light cure+ FiltekZ250). After 24 hrs. immersion in 2% in methylene blue, samples were sectioned and micro leakage was estimated. Results: None of the
... Show MoreABSTRACT Background: Diabetes and periodontitis are complicated prolonged disorders through a recognized two-way association. There is elongated-conventional mark that hyperglycaemia in diabetes is affected on immune-inflammatory response and disturb the action of osteoclast and in balance bone turnover, which might rise the person vulnerability to the progress of prolonged periodontitis. Osteocalcin is one of the greatest plentiful matrix proteins originate in bones and produced absolutely there. Small osteocalcin crumbles are noticed in regions of bone remodeling and are in fact degradation products of the bone matrix, that is released outside cells into the Gingival Crevicular Fluid (GCF) and saliva after destruction of periodontal tissu
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show More