Two oil wells were tested to find the abnormal pressure zones using sonic log technique. We found that well Abu-Jir-3 and Abu-Jir-5 had an abnormal pressure zones from depth 4340 to 4520 feet and 4200 to 4600 feet, respectively. The maximum difference between obtained results and the field measured results did not exceed 2.4%.
In this paper, the formation pressures were expressed in terms of pressure gradient which sometimes reached up to twice the normal pressure gradient.
Drilling and developing such formations were dangerous and expensive.
The plotted figures showed a clear derivation from the normal trend which confirmed the existence of abnormal pressure zones.
This research aims at making a comparative survey between the dry season in (2017-2018) and the wet season (2018-2019) in Iraq concerning the variation of rainfall and pressure systems responsible for such a difference. In this paper, seven climatological stations have been selected: Mosul, Kirkuk, Khanaqin, Baghdad, Rutba, Diwaniyah and Basra. Results have shown that the first category of rainfall of the two seasons has recorded a higher number of rainy days in comparison with the second and third categories with a total of 274 day in a dry season and 403 day of a wet season. Further, the total amount of the annual continuous rain is higher than the total of thunderstorms in a dry season as well as in the
... Show More 
The construction sector is considered an important and influential pivot in the national economy of any country. Nations are working to develop this sector, receiving modern and developed techniques. So, this sector can be a carrier or a receiver of modern technologies. The cost of technology transfer between the international companies that sponsor this sector is a matter of great importance, especially since different factors affect the need for this advanced technology. The cost of technology transfer in construction is related to multiple factors presented by Knowledge, equipment, plant, hardware and software. The lack of distinguishing and evaluating the direct and indirect costs in the construction sector during
... Show MoreThis study aimed to detect Anaplasma phagocytophilum in horses through hematological and molecular tests. The 16S rRNA gene of the Anaplasma phagocytophilum parasite was amplified by polymerase chain reaction (PCR), then sequenced, and subjected to phylogenetic analysis to explore "Equine Granulocytic Anaplasmosis" (EGA) infection in three important gathering race horses areas in Baghdad governorate, Iraq. Blood samples were obtained from 160 horses of varying ages, three breeds, and both sexes, between January and December 2021. Prevalence and risk variables for anaplasmosis were analyzed using statistical odds ratio and chi-square tests. Results demonstrated that clinical anaplasmosis symptoms comprised jaundice, wei
... Show MoreAcontaminated ophthalmic solutions represent a potential cause of avoidable ocular infection. This study aimed to determine the magnitude and pattern of microbial contamination of eye drops in out patient at the department of ophthalmology, at Baghdad national hospital, Iraq. Fifty four vials from the out patient clinic were obtained for microbial examination after an average use of 2 weeks. The dropper tip and the residual eye drop were examined for contamination. The specimens were cultured, the number of colonies counted, the organisms identified. Eight (15%) out of 54 analyzed vials were contaminated , most bacteria identi
... Show MoreThis paper shows that there are few studies on errors and difficulties with unstressed pronouns in Spanish. Similarly, when consulting teaching methods, we find that the most consulted texts are ELE manuals. In this sense, the purpose of this paper is to verify the teaching proposal regarding unstressed pronouns in the ELE manuals most used at the Faculty of Languages - University of Baghdad, Iraq. It is urgently needed for ELE teachers in Iraq and students to obtain the most recent ELE manuals, as this will help them teach and learn about unstressed pronouns with texts that contain more didactic and engaging exercises. Furthermore, teachers will be able to plan strategies and lessons for the correct use of these texts.
Abstract The aim of this study is preparing an intellectual map according to the feedback (verbally and writhingly ) in order to learn some skills of floor exercises in the women's artistic gymnastics , In addition to that the aim of this study defines on the impacts of intellectual map according to the feedback approach, and to identify the best group between the three groups study in the learning of skills approach in this study, the researchers used the experimental method, the subject of the study included on students second class in physical education and sport sciences , Baghdad University (2014-2015) , and divided into three groups for teaching skills which was under studied .The species used the specific manner by lot for selection
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show More