Resource estimation is an essential part of reservoir evaluation and development planning which highly affects the decision-making process. The available conventional logs for 30 wells in Nasiriyah oilfield were used in this study to model the petrophysical properties of the reservoir and produce a 3D static geological reservoir model that mimics petrophysical properties distribution to estimate the stock tank oil originally in place (STOOIP) for Mishrif reservoir by volumetric method. Computer processed porosity and water saturation and a structural 2D map were utilized to construct the model which was discretized by 537840 grid blocks. These properties were distributed in 3D Space using sequential Gaussian simulation and the variation in OWC depth was represented by 3 initialization regions for better characterization. The total STOOIP of Mishrif reservoir in Nasiriyah oilfield was estimated to be 8951 MMSTB which is divided between two reservoir units: MB1 and MB2 in which the first contains approximately 75% of total STOOIP and the latter has the remaining 25%.
The literature shows conflicting outcomes, making it difficult to determine how e-learning affects the performance of students in higher education. The effect of e-learning was studied and data has been gathered with the utilization of a variety of qualitative and quantitative methods, especially in relation to students' academic achievements and perceptions in higher education, according to literature review that has been drawn from articles published in the past two decades (2000-2020). The development of a sense of community in the on-line environment has been identified to be one of the main difficulties in e-learning education across this whole review. In order to create an efficient online learning community, it could be claim
... Show MoreInformation centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show MoreWhat distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreNumerous drilling additives and materials are used continuously because they are necessary to support and give the required properties of the drilling fluid so that to ensure the stability of the borehole. This paper aspires to evaluate the rheological properties of bentonite (montmorillonite) Trefawey as an alternative to using commercial bentonite. Monitoring and evaluating of the rheological and filtration properties were prepared. This exertion aims to focus on the effect of hematite, and barite on the rheological properties of the three aforementioned bentonite types. An improvement in the rheological properties of bentonite (montmorillonite). Trefawey was observed after adding the previous heavy materials. Hematite has by some
... Show MoreDiscrete logarithms are applied in many cryptographic problems . For instance , in public key . and for construction of sets with disti nct sums of k-clcments. The purpose o r this paper
is to modify the method ol' informationl1·iding using discrete logarithms , introduce new properties of St - sets , uscdthe direct product of groups to construct cyclic group and finally, present modified method for knapsack &
... Show More8-hydroxyguanosine (8-OHdG) is considered as an indicator of the oxidative stress. Pro inflammatory cytokines are critical parts of the pathophysiological processes to which treatment can be applied. The aim of this study was to evaluate 8-OHdG and pro inflammatory cytokines concentration in colon carcinoma patients. Blood samples were taken before treatment from 50 incident cases with colon cancer (stage III) admitted for health examination at the Nanakali Hospital in Erbil city with 45 healthy samples of controls with age range between 38-69 years for both groups. All studied parameters were estimated by ELISA. Participants at this study were 95 Participants ranged in age from 38 to 69 years, 50 Participants had been newly diagnosed wi
... Show MoreOne of the key molecules in the conversion of sphingosine to sphingosine-1- phosphate is SPHK-1, also known as Sphingosine Kinase 1 (SPHK-1). Sphingosine-1-phosphate (S1P) is a lipid that acts as a signaling molecule and plays an essential role in inflammatory and immunomodulatory responses. S1P has recently been identified as a mediator and a biomarker in inflammatory bone diseases such as osteoporosis and inflammatory osteolysis based on the biological effects of S1P in osteoclastic and osteoblastic cells and immune cells. According to recent research, S1P may play a role in the pathogenesis of periodontitis, an inflammatory bone-destructive condition. This study assesses the salivary level SPHK-1 in periodontitis and its correlat
... Show MoreThe study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o
... Show MoreIn Iraqi patients with acromegaly the present investigation included 40 control group and 70 patients with acromegaly divided 35 patients with Diabetic while another 35 patients without Diabetic, with ages between (29-72) years for the identification of GST activity polymorphisms by present and absent GSTM1, GSTT1, and PCR-RFLP, enzymatic digestions were carried out using BsmAI (Biolabs. England, UK) for GSTP1b and AciI (Biolabs, England, UK) for GSTP1c.the association GSTActivity with GST genotype were investigated in a cohort of Iraq acromegaly patients comparing with the healthy control group. The results show a non-significant change in GSTP1b gene in both groups, while show high significantly in GSTP1c in diabetic and non-diabetic acro
... Show More