The most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishrif Formation; MA, MB11, MB12, MB21, MC1, and MC2. The precise facies modelling is constructed by using Petrel software while applying different appropriate scale-up methods. Consequently, the petrophysical properties such as porosity, water saturation and permeability are distributed within each unit depending on facies modelling. The Net to a gross parameter which has a significant impact on determining original oil in place (OIIP) also calculated and distributed using facies modelling. The facies modelling is performed to obtain an accurate estimation of OIIP. Finally, the results of the facies investigation have a significant effect on petrophysical properties and therefore affect the estimation of OIIP by 2\% for the whole Mishrif Formation.
Background: Apicoectomy and retrograde filling is indicated when conventional endodontic treatment is impossible or failed to achieve apical seal. The aim of this study was to evaluate the effect of ER: YAG laser on apical microleakage. Materials and Methods: Sixty extracted single-rooted teeth were used in this study. The roots were divided into six groups. Group 1: apicoectomy by fissure bur, and apical cavities prepared by round bur, then cavities were filled with MTA. Group 2: the roots preparations and fillings were the same as group 1, then the apical areas were treated by Er:YAG Laser. Group 3: apicoectomy by fissure bur, and apical cavities prepared by ultrasound retrotip and cavities were filled with MTA. Group 4: the roots prepara
... Show MoreThis study was conducted at the Research Experimental Station of the College of Agricultural Engineering/University of Baghdad in the Al-Jadiriyah area during the autumn season of 2022. The study aimed to investigate the effect of phosphorus addition and zinc spraying on the nutrient content and root growth of the cabbage. The experiment included two factors: the first factor was phosphorus with four concentrations (P25%, P50%, P75%, and P100%) of the recommended complete fertilizer dose (135 kg P2O5 per hectare), and the second factor was zinc spraying with three concentrations (0, 30, and 60 mg.L-1) of zinc sulfate (ZnSO4). The results showe
The research paper deals with the role of the place making in eco-tourism through a review of international experiences in the eco-tourism industry and its contribution to advancing the reality of tourism there, and attracting the largest number of tourists. The study is divided into five axes: the first is a study of related concepts, and the second is a study of global experiences, which included three countries: (South Bank (Gabriel's Wharf) - London, Rotterdam in the Netherlands, and dealt with each of Happy Streets and Kendrick Mills, and then the Perak River tourist corridor - Malaysia). As for the third axis, it is concerned with analyzing these experiences to reach th
... Show MoreProgression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show MoreBored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000
... Show MoreMetal-organic frameworks (MOFs) are a relatively new class of materials of unique porous structures and exceptional properties. Currently, more than 110,000 types of MOFs have been reported among the countless possibilities. In this study, we have synthesised a novel MOF using zirconium chloride as the metal source and 4,4'-dicarboxy-2,2'-biquinoline (bicinchoninic acid disodium salt) as the linker, which reacted in N,N-Dimethylformamide (DMF) solvent. Three preparation methods were employed to prepare five types of the MOF, and they were compared to optimize the synthesis conditions. The resulting MOFs, named Zr-BADS, were characterised using scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), microscopy, and
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreIn this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D
... Show More