Preferred Language
Articles
/
aBbiH4kBVTCNdQwCG4Zt
Prediction of Hydraulic Flow Units for Jeribe Reservoir in Jambour Oil Field Applying Flow Zone Indicator Method
...Show More Authors

The Jeribe reservoir in the Jambour Oil Field is a complex and heterogeneous carbonate reservoir characterized by a wide range of permeability variations. Due to limited availability of core plugs in most wells, it becomes crucial to establish correlations between cored wells and apply them to uncored wells for predicting permeability. In recent years, the Flow Zone Indicator (FZI) approach has gained significant applicability for predicting hydraulic flow units (HFUs) and identifying rock types within the reservoir units.    This paper aims to develop a permeability model based on the principles of the Flow Zone Indicator. Analysis of core permeability versus core porosity plot and Reservoir Quality Index (RQI) - Normalized porosity log-log plot reveals the presence of three distinct Hydraulic Flow Units and corresponding rock types within the Jeribe reservoir. These rock types can be identified if known. The reservoir can be divided into three groups of rock types, namely good, moderate, and bad quality. The bad rock type represents a restricted section within the reservoir, while the upper and lower parts predominantly consist of moderate-quality rock types. Conversely, the central section of the reservoir exhibits a good-quality rock type.    By utilizing the Flow Zone Indicator principles, this study provides valuable insights into the hydraulic flow behavior and rock types present in the Jeribe reservoir. The proposed permeability model derived from this method can aid in predicting permeability values for uncored wells, contributing to a better understanding of the reservoir's heterogeneity and facilitating reservoir characterization and management decisions.

Crossref
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Results on The Complete Arcs in Three Dimensional Projective Space Over Galois Field
...Show More Authors

        The aim of this paper is to introduce the definition of projective 3-space over Galois field GF(q), q = pm, for some prime number p and some integer m.

        Also the definitions of (k,n)-arcs, complete arcs, n-secants, the index of the point and the projectively equivalent arcs are given.

        Moreover some theorems about these notations are proved.

 

View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating Training Programs According to model Kirkpatrick / field research in the Health Maysan Directorate .
...Show More Authors

This present paper aim at knowing  the process of evaluating the training program that could be applied  in Maysan Health office  for it significance and importance in field of management and vocational staff  preparations  of high  scientific experience in different fields of  Health.  The society of research includes staffs  working in Maysan Health Office  , of specialists ,  dentists, pharmacists, laboratories, nursing  and administrators. Their number is 100 employees, the researcher has designed questionnaire by depending on "Kirkpatrick"  for assessing  the training . The researcher has used   thorough survey and has entailed 90 questionnaire,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Analytical Study Compared Between Poisson and Poisson Hierarchical Model and Applied in Healthy Field
...Show More Authors

Through this research, We have tried to evaluate the health programs and their effectiveness in improving the health situation through a study of the health institutions reality in Baghdad to identify the main reasons that affect the increase in maternal mortality by using two regression models, "Poisson's Regression Model" and "Hierarchical Poisson's Regression Model". And the study of that indicator (deaths) was through a comparison between the estimation methods of the used models. The "Maximum Likelihood" method was used to estimate the "Poisson's Regression Model"; whereas the "Full Maximum Likelihood" method were used for the "Hierarchical Poisson's Regression Model

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Complete (k,r)-Cap in PG(3,p) Over Galois Field GF(4)
...Show More Authors

   The aim of this paper is to construct the (k,r)-caps in the projective 3-space PG(3,p) over Galois field GF(4). We found that the maximum complete (k,2)-cap which is called an                       ovaloid  , exists in PG(3,4) when k = 13. Moreover the maximum (k,3)-caps, (k,4)-caps and   (k,5)-caps. 

View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
((Human Resource Staffing Strategy and and its impact in the high performance A Field research in Ministry of Agriculture))
...Show More Authors

Abstract

were determine the problem of current research to answer the  question on the consciousness of the Ministry of Agriculture to adopt Staffing  strategy and identify the shortcomings  as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as  dependent   variable is described  in  four dimensions (leadership, strategy, structure and processes, culture), in this research were  Used  analytical descriptive  style . This research aims to identify the correlation and impact  of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between

... Show More
View Publication
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Alternative Sanctions and their Impact on Societal Security: A Field Study in the Directorate of Juveniles Reformatory in Baghdad
...Show More Authors

Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 28 2018
Journal Name
Journal Of Engineering
Enhanced Oil Recovery using Smart Water Injection
...Show More Authors

Smart water flooding (low salinity water flooding) was mainly invested in a sandstone reservoir. The main reasons for using low salinity water flooding are; to improve oil recovery and to give a support for the reservoir pressure.

In this study, two core plugs of sandstone were used with different permeability from south of Iraq to explain the effect of water injection with different ions concentration on the oil recovery. Water types that have been used are formation water, seawater, modified low salinity water, and deionized water.

The effects of water salinity, the flow rate of water injected, and the permeability of core plugs have been studied in order to summarize the best conditions of low salinity

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF