The reserve estimation process is continuous during the life of the field due to risk and inaccuracy that are considered an endemic problem thereby must be studied. Furthermore, the truth and properly defined hydrocarbon content can be identified just only at the field depletion. As a result, reserve estimation challenge is a function of time and available data. Reserve estimation can be divided into five types: analogy, volumetric, decline curve analysis, material balance and reservoir simulation, each of them differs from another to the kind of data required. The choice of the suitable and appropriate method relies on reservoir maturity, heterogeneity in the reservoir and data acquisition required. In this research, three types of reserve estimation used for the Mishrif formation / Amara oil field volumetric approach in mathematic formula (deterministic side) and Monte Carlo Simulation technique (probabilistic side), material balance equation identified by MBAL software and reservoir simulation adopted by Petrel software geological model. The results from these three methods were applied by the volumetric method in the deterministic side equal to (2.25 MMMSTB) and probabilistic side equal to (1.24, 2.22, 3.55) MMMSTB P90, P50, P10 respectively. OOIP was determined by MBAL software equal to (2.82 MMMSTB). Finally, the volume calculation of OOIP by using the petrel static model was (1.92 MMMSTB). The percentage error between material balance and the volumetric equation was equal to 20% while the percentage error between the volumetric method and petrel software was 17%.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreBackground: Potentially malignant oral disorders (PMODs) are common precursors of oral squamous cell carcinoma (OSCC). Neoangiogenesis and signalling are important intermediate biomarkers that may govern the progression of dysplastic mucosa into carcinoma. Aims: Evaluate the importance of CD34 and Wnt3 expression in PMODs and OSCCs in relation to their clinicopathological parameters. Settings and Design: Prospective cross-sectional study. Materials and Methods: Immunohistochemical staining for CD34 and Wnt3 was performed for 41 samples. These included 27 PMODs, six OSCCs and eight normal gingival and alveolar mucosa. Analysis of variance (ANOVA) and post-hoc tests were applied. P<0.05 was considered statistically significant. Results: CD34
... Show MoreThe road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th
... Show MorePrimary productivity and chlorophyll-a were used in this study to monitor the restoration process of southern Iraqi marshes (Al-Hewaizeh, central marshes, and Al-Hammar). The phytoplankton primary productivity was based on oxygen light/dark bottle method. Two different depths samples were taken monthly from six studied marshes stations (two stations for each marsh) during November 2005 to October 2006, while chlorophyll-a samples taken from surface water. The phytoplankton primary productivity values ranged 9.38 – 249.79 mg C/m3.hr for all marshes, its values for surface water sample ranged 11.71 – 256.24 mg C/m3.hr, while for 1m depth ranged 9.38 – 142.5 mg C/m3.hr. Chlorophyll-a values ranged between (1.1 – 21.26) µg/l indicating
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
The research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of
... Show MorePiracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.
The severe acute respiratory syndrome coronavirus 2 (SARS-CoV 2) or 2019 novel coronavirus (2019-nCoV) is quickly spreading to the rest of the world, from its origin in Wuhan, Hubei Province, China. And becoming a global pandemic that affects the world's most powerful countries. The goal of this review is to assist scientists, researchers, and others in responding to the current Coronavirus disease (covid-19) is a worldwide public health contingency state. This review discusses current evidence based on recently published studies which is related to the origin of the virus, epidemiology, transmission, diagnosis, treatment, and all studies in Iraq for the effect of covid-19 diseases, as well as provide a reference for future research
... Show MoreThe present study aimed at shed light on the association between HLA-class I antigens (A, B and Cw) and brain tumours (meningioma and glioma) in the basis of their individual frequencies or two-locus association A total of 52 brain tumour patients were enrolled in this study, with an age range of 7-68 years. The patients were divided into two clinical groups; meningioma (20 cases) and glioma (22 cases), while the remaining 10 cases represented other types of brain tumour. Control samples included 47 Iraqi Arab apparently healthy blood volunteers, with an age range of 15-50 year. Three HLA antigens showed a significant increased frequency in total patients as compared to controls. They were B13 (34.6 vs. 6.5%), B40 (15.4 vs. 2.2%) and Cw3
... Show More