The Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostrome facies extends to a shallow interior shelf as a patch reef, indicating a regressive trend. Petrographic studies on 3174 thin sections identified twelve microfacies in the Bangestan reservoir. In the Sarvak Formation, the dominant microfacies consist of rudist biostrome, shoal bar, and lagoon facies, with a high sedimentation rate in the basin, whereas the Ilam Formation involves open and deep-marine facies. Seismic tectono-stratigraphy shows that there are seven sedimentary sequences with mostly regressive cycles and six maximum flooding surfaces from the upper Albian to the Santonian. In addition, the Ahwaz oilfield had experienced pre-tectonic extension before the Early Cretaceous and post-tectonic extension after the Late Cretaceous. The isotopic data from the Bangestan reservoir demonstrate two important disconformities (Cenomanian-Turonian and post-Turonian) that had an important influence on the evolution of the area evolution. Sr geochronology confirms long-term exposure to two main disconformities within the Ahwaz Bangestan reservoir.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreWellbore instability is one of the most common issues encountered during drilling operations. This problem becomes enormous when drilling deep wells that are passing through many different formations. The purpose of this study is to evaluate wellbore failure criteria by constructing a one-dimensional mechanical earth model (1D-MEM) that will help to predict a safe mud-weight window for deep wells. An integrated log measurement has been used to compute MEM components for nine formations along the studied well. Repeated formation pressure and laboratory core testing are used to validate the calculated results. The prediction of mud weight along the nine studied formations shows that for Ahmadi, Nahr Umr, Shuaiba, and Zubair formations
... Show MoreAbstract:
This study is considerated one of many Studies above the standing of
the Islamic Arab nation which was chosen by God from other nations all over
the world . Some of these nations used to come to the Arab nation to take
whatever useful for them from the beginning of history till now . The
researcher deals in this study with a French artist who is well-know as
August Renoir . He traveled to Algeria and lived there . He was
influenced by the Islamic culture.
The study include. from chapter . chapter one deals with the framework of
programming (out line ) . Chapter two deals with the theoretical framework .
It includes five sections. Deals with the Islamic drawings(Arabesque) . section
three deals w
The research aims at identifying the organizational performance of the kindergarten teachers and defines the educational environment of kindergarten children. To achieve the objectives of the research, the researcher adopted the organizational performance scale for (Saadi, 2016), which was applied to kindergarten teachers. The scale consists of (43) paragraphs, and has good reliability and validity, as the coefficient of reliability (84.0) in a retest method, and (87.0) using the formula Alpha Kronbach. Additionally, the researcher adopted the educational environment scale for (Radam, 2015); the scale consists of (66) paragraphs, and it enjoys a good reliability and validity, as the coefficient of reliability (89.0) method of reliability
... Show MoreTime-domain spectral matching commonly used to define seismic inputs to dynamic analysis in terms of acceleration time history compatible with a specific target response spectrum is used in this study to investigate the second-order geometric effect of P-delta on the seismic response of base-isolated high-rise buildings. A synthetic time series is generated by adjusting reference time series that consist of available readings from a past earthquake of the 1940 El Centro earthquake adopted as an initial time series. The superstructure of a 20-story base isolated building is represented by a 3-D finite element model using ETABS software. The results of the base isolated building show that base isolation technique significantly reduces inter-s
... Show MoreThe petrophysical characteristics of five wells drilled into the Sa'di Formation in the Halfaya oil field were evaluated using IP software to determine a reservoir and explore hydrocarbon reserve zones. The lithology was evaluated using the M-N cross-plot method. The diagram showed that the Sa'di Formation was mainly composed of calcite (represented by the limestone region) is the main mineral in the Sa′di Reservoir. Using a density-neutron cross plot to identify the lithology showed that the formation mainly consists of limestone with minor shale. Gamma-ray logs were employed to calculate the shale quantity in each well. The porosity at weak hole intervals was calculated using a sonic log and neutron-density log at the reservoir
... Show MoreIntelligent or smart completion wells vary from conventional wells. They have downhole flow control devices like Inflow Control Devices (ICD) and Interval Control Valves (ICV) to enhance reservoir management and control, optimizing hydrocarbon output and recovery. However, to explain their adoption and increase their economic return, a high level of justification is necessary. Smart horizontal wells also necessitate optimizing the number of valves, nozzles, and compartment length. A three-dimensional geological model of the As reservoir in AG oil field was used to see the influence of these factors on cumulative oil production and NPV. After creating the dynamic model for the As reservoir using the program Petrel (2017.4), we
... Show More