Porosity is important because it reflects the presence of oil reserves. Hence, the number of underground reserves and a direct influence on the essential petrophysical parameters, such as permeability and saturation, are related to connected pores. Also, the selection of perforation interval and recommended drilling additional infill wells. For the estimation two distinct methods are used to obtain the results: the first method is based on conventional equations that utilize porosity logs. In contrast, the second approach relies on statistical methods based on making matrices dependent on rock and fluid composition and solving the equations (matrices) instantaneously. In which records have entered as equations, and the matrix is solved in one step, the porosity, saturation, and volume of minerals embedded inside the rock formations were obtained. The results indicated that the porosity was determined using statistical and conventional approaches matched to the core porosity. In the end, statistical techniques afford a different path for calculation and provide outcomes that can be used in all situations, particularly when the rock has many types of components. Furthermore, it is not based on conventional equations and overcomes the problems coming from the unreliability of porosity logs in formations containing mixed minerals.
Rapid and continuous developments and changes in the modern business environment in all areas of economic, environmental, social, technology and communications push economic units to search for modern methods and methodologies to produce products at low cost as well as produce products that meet the wishes of customers in terms of quality and environment to maintain their market position, and accounting for the costs of the flow of materials is one of the most prominent environmental management accounting techniques capable of providing information to help produce
Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreThe study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det
Abstract:-
The phenomenon of financial and administrative corruption is not the result today, but not tied to time or designated place, he is the scourge is rampant in all countries of the world, without exception, those developed and developing, a phenomenon that crossed national boundaries and become withstand a global character, and corruption is limited to communities of particular economic systems without the other, but suffered Throughout history most societies to varying degrees, Iraq is one of the countries that suffered and continues to suffer from corruption, which has become, B grumble in most of the Iraqi state institutions, especially after the occupation in 2003 as administrative corruption in Iraq arrived i
... Show MoreBackground: Orofacial cleft is the most common craniofacial birth defect and the fourth most common congenital malformation in humans that have an effect on oral health in addition to nutrient intake affected in those children. This research aims to investigate gingival condition, dental caries experience and nutritional status among children with orofacial cleft and compare them with normal children. Materials and methods: The study group included 36 children with an age ranged (4-9) years of orofacial cleft. The control group included 37 children matched the control group in age and gender. Gingival condition measured by Gingival Index (Löe and Silness, 1963), while dental caries status was measured by (D1-4MFs/d1-4mfs) index according
... Show MoreA total of 215 sheep and 87 goats were carefully searched for ixodid ticks from January to December 2015 at different regions of the middle and south of Iraq. The detached ticks count 1533 ticks from sheep with intensity of 8.4 and count 332 ticks from goats with intensity of 6.8. Tick species recovered from sheep and their incidence rates were: Rhipicephalus turanicus (39%), Hyalomma anatolicum (28%), R. (Boophilus) annulatus (11%), Hyalomma sp. (9%), H. turanicum (6%), H. excavatum (6%) and R. leporis (1%) while the tick species recovered from goats and their incidence rates were: R. turanicus (64%), H. anatolicum (24%)
... Show MoreAbstract
The methods of the Principal Components and Partial Least Squares can be regard very important methods in the regression analysis, whe
... Show MoreThis study is descriptive and theory of Dawn syndrome as the problem of research lies in the need to identify the identification of the causes of Dawn syndrome and its symptoms and methods of dealing with it, which has become a problem that needs treatment, especially after the numbers have become high in Iraq, which has not yet taken the necessary importance for treatment and care.
The objectives of the research were summarized in the identification of the most important causes of Dawn syndrome and its symptoms and diagnosis and ways or methods of dealing with people with Dawn syndrome in order to develop therapeutic plans for him.
... Show More
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More