The reserve estimation process is continuous during the life of the field due to risk and inaccuracy that are considered an endemic problem thereby must be studied. Furthermore, the truth and properly defined hydrocarbon content can be identified just only at the field depletion. As a result, reserve estimation challenge is a function of time and available data. Reserve estimation can be divided into five types: analogy, volumetric, decline curve analysis, material balance and reservoir simulation, each of them differs from another to the kind of data required. The choice of the suitable and appropriate method relies on reservoir maturity, heterogeneity in the reservoir and data acquisition required. In this research, three types of reserve estimation used for the Mishrif formation / Amara oil field volumetric approach in mathematic formula (deterministic side) and Monte Carlo Simulation technique (probabilistic side), material balance equation identified by MBAL software and reservoir simulation adopted by Petrel software geological model. The results from these three methods were applied by the volumetric method in the deterministic side equal to (2.25 MMMSTB) and probabilistic side equal to (1.24, 2.22, 3.55) MMMSTB P90, P50, P10 respectively. OOIP was determined by MBAL software equal to (2.82 MMMSTB). Finally, the volume calculation of OOIP by using the petrel static model was (1.92 MMMSTB). The percentage error between material balance and the volumetric equation was equal to 20% while the percentage error between the volumetric method and petrel software was 17%.
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreSwarming is one of the most important virulence factors used by bacteria to invade new sites. This study aimed to test the effects of gentamicin on swarming motility of Pseudomonas aeruginosa, both phenotypically and molecularly. The present results revealed that 11/25 isolates had gentamicin MIC of 1024 µg/ml. However, gentamicin at sub-minimal inhibitory concentration significantly (P< 0.05) reduced the diameter of swarming in all P. aeruginosa isolates. Noticeably the mean and median swarming diameter before treatment with gentamicin 5.557 and 5.816 cm respectively had significantly (P < 0.001) reduced to 0.871 and 0.766 cm respectively. At the molecular level, amrZ (a global regulator of multiple genes) and
... Show MoreMultilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d
This study presents the effect of laser energy on burning loss of magnesium from the holes' drilled in aluminum alloy 5052. High energy free running pulsed Nd:Glass laser of 300 µs pulse duration has been used to perform the experiments. The laser energy was varied from 1.0 to 8.0 Joules, The drilling processes have been carried out under atmospheric pressure and vacuum inside a specially designed chamber. Microhardness of the blind drilled holes has been investigated .The results indicated that the magnesium loss could be manipulated by adjusting the focusing conditions of the laser beam. Almost, the obtained holes were free of cracks with low taper and low sputter deposition. .The holes performed under atmospheric conditions have high
... Show MoreThe investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of informat
... Show MoreObjectives: to compare health of mothers and neonatal among age groups, to find out the correlation between
age groups and mother and neonatal health.
Methodology: A descriptive study was carried out at delivery rooms of three teaching hospitals in Baghdad city
from Feb. 28th through May. 28th
, 2013. A purposive (non-probability) sample of 300 laboring women was selected
from delivery rooms categorized into three groups, group 1 (≤19) years, group 2 their age between (20-35) years
old and group 3 their age (≥35) years. The data were collected through the use of constructing questionnaire, an
interview technique with mothers and reviewing their medical records as means of data collection; The
questionnaire con
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn the 1980s, the French Administration Roads LCPC developed high modulus mixtures (EME) by using hard binder. This type of mixture presented good resistance to moisture damage and improved . mechanical properties for asphalt mixtures including high modulus, good fatigue behaviour and excellent resistance to rutting. In Iraq, this type of mixture has not been used yet. The main objective of this research is to evaluate the performance of high modulus mixtures and comparing them with the conventional mixture, to achieve this objective, asphalt concrete mixes were prepared and then tested to evaluate their engineering properties which include moisture damage, resilient modulus, permanent deformation and fatigue characteristics. These prope
... Show More