The reserve estimation process is continuous during the life of the field due to risk and inaccuracy that are considered an endemic problem thereby must be studied. Furthermore, the truth and properly defined hydrocarbon content can be identified just only at the field depletion. As a result, reserve estimation challenge is a function of time and available data. Reserve estimation can be divided into five types: analogy, volumetric, decline curve analysis, material balance and reservoir simulation, each of them differs from another to the kind of data required. The choice of the suitable and appropriate method relies on reservoir maturity, heterogeneity in the reservoir and data acquisition required. In this research, three types of reserve estimation used for the Mishrif formation / Amara oil field volumetric approach in mathematic formula (deterministic side) and Monte Carlo Simulation technique (probabilistic side), material balance equation identified by MBAL software and reservoir simulation adopted by Petrel software geological model. The results from these three methods were applied by the volumetric method in the deterministic side equal to (2.25 MMMSTB) and probabilistic side equal to (1.24, 2.22, 3.55) MMMSTB P90, P50, P10 respectively. OOIP was determined by MBAL software equal to (2.82 MMMSTB). Finally, the volume calculation of OOIP by using the petrel static model was (1.92 MMMSTB). The percentage error between material balance and the volumetric equation was equal to 20% while the percentage error between the volumetric method and petrel software was 17%.
Abstract To estimate the seroprevalence of HCV infection among HIV-infected haemophiliacs and to demonstrate the most prevalent HCV genotype, 47 HIV-infected haemophilia patients were screened for anti-HCV antibodies. By performing polymerase chain reaction and DNA enzyme immunoassay, HCV-RNA was detected with subsequent genotyping. Seroprevalence of anti-HCV antibodies was 66.0%. Of 31 HCV/HIV co-infected patients, 21 (67.7%) had no history of blood transfusion. We detected 4 HCV genotypes: 1a, 1b, 4 and 4 mixed with 3a, HCV-1b being the most frequent. Contaminated factor VIII (clotting factor) could be responsible for disease acquisition.
تتحقق اهداف الدول عبر توظيف امكانياتها ومواردها ، وهذا التوظيف يقترن بوسائل مختلفة باختلاف الامكانيات المتاحة. وتتفاوت هذه الوسائل ما بين الاكراه والترغيب ، واحياناً من الممكن استخدام كلا الوسيلتين ، وتندرج هذه الوسائل من حيث تصنيفها ضمن نوعين رئيسين هما: القوة الصلبة ]القوة العسكرية والاقتصادية[ والقوة الناعمة ]استخدام جميع ادوات الترغيب وتسخيرها من اجل ان تُعجب بها الدول الاخرى وتنصاع
... Show MoreA vocative expression can be defined as an expression of direct address where the participant identity is set forth explicitly within a sentence. This study aims at showing how the vocative particles are used in literally texts, namely in the short story “The Garden Party" written by Kathryn Mansfield and identifying the forms of these vocative particles as used by the characters along with the functions of these vocative particles. For the analysis of vocative forms, the researcher used Quirk and Greenbaum (1973) model. Functionally, the data were analyzed based on Quirk et al. (1985) model. However, the results of this study shows that the characters in “The Garden Party” short story used various forms of vocative particles and
... Show MoreSeveral studies have indicated that more than 600 cities in the world (intermas of rapid growth and development) will generate about 60% of international economic growth between 2010 and 2025 . by 2025 , 66% of the worlds population will live in urban areas the management of cities will face challenges that accompany this increase in the population which requires preparing to face these challenges and problems and the need to provide the aim of the research to know the readiness of Baghdad city to implement the strategies of urban management throught on asmple representing the ( Advisiry group for the comprechnsive development plan for the city of Baghdad 2030 and its supporters ) in the municipality of Baghdad and the number of
... Show MoreThe aim of this study is to look at the potential of a local sustainable energy network in a pre-existing context to develop a novel design beneficial to the environment. Nowadays, the concept of smart cities is still in the developmental phase/stage andwe are currently residing in a transitional period, therefore it is very important to discover new solutions that show direct benefits the people may get from transforming their city from a traditional to a smart city. Using experience and knowledge of successful projects in various European and non-European smart cities, this study attempts to demonstrate the practical potential of gradually moving existing cities to t
... Show MoreTenofovir disoproxil fumarate, a nucleotide reverse transcriptase inhibitor utilized for the treatment of hepatitis B virus and human immunodeficiency virus infections; and is now one of the most widely used antiretroviral drug. However, tenofovir disoproxil fumarate can induce nephrotoxicity, which may be attributed to the interaction between such drug and the organic anion transporters (hOAT1, and OAT3) with consequent changes in levels of some parameters that may have a role in nephrotoxicity. Thiazide diuretics have high to intermediate potency of inhibition of OAT1s and OAT3; thus, it may possess nephroprotective effects. This study was designed to investigate whether hydrochlorthiazide has nephroprotective effects on tenofovir diso
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More