This research was aimed to determine the petrophysical properties (porosity, permeability and fluid saturation) of a reservoir. Petrophysical properties of the Shuiaba Formation at Y field are determined from the interpretation of open hole log data of six wells. Depending on these properties, it is possible to divide the Shuiaba Formation which has thickness of a proximately 180-195m, into three lithological units: A is upper unit (thickness about 8 to 15 m) involving of moderately dolomitized limestones; B is a middle unit (thickness about 52 to 56 m) which is composed of dolomitic limestone, and C is lower unit ( >110 m thick) which consists of shale-rich and dolomitic limestones. The results showed that the average formation water resistivity for the formation (Rw = 0.021), the average resistivity of the mud filtration (Rmf = 0.57), and the Archie parameters determined by the picket plot method, where m value equal to 1.94, n value equal to 2 and a value equal to 1. Porosity values and water saturation Sw were calculated along with the depth of the composition using IP V3.5 software. The interpretation of the computer process (CPI) showed that the better porous zone holds the highest amount of hydrocarbons in the second zone. From the flow zone indicator method, there are four rock types in the studied reservoir.
Formation evaluation is a critical process in the petroleum industry that involves assessing the petrophysical properties and hydrocarbon potential of subsurface rock formations. This study focuses on evaluating the Mauddad Formation in the Bai Hassan oil field by analyzing data obtained from well logs and core samples. Four wells were specifically chosen for this study (BH-102, BH-16, BH-86, and BH-93). The main objectives of this study were to identify the lithology of the Mauddud Formation and estimate key petrophysical properties such as shale volume, porosity, water saturation, and permeability. The Mauddud Formation primarily consists of limestone and dolomite, with some anhydrites present. It is classified as a clean for
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThis work presents a comparison between the Convolutional Encoding CE, Parallel Turbo code and Low density Parity Check (LDPC) coding schemes with a MultiUser Single Output MUSO Multi-Carrier Code Division Multiple Access (MC-CDMA) system over multipath fading channels. The decoding technique used in the simulation was iterative decoding since it gives maximum efficiency at higher iterations. Modulation schemes used is Quadrature Amplitude Modulation QAM. An 8 pilot carrier were
used to compensate channel effect with Least Square Estimation method. The channel model used is Long Term Evolution (LTE) channel with Technical Specification TS 25.101v2.10 and 5 MHz bandwidth bandwidth including the channels of indoor to outdoor/ pedestrian
Business Ethics play a major role in explaining the behavior of those interested in the management of tourism enterprises in the field of management gains, which sometimes turn to manipulation in the specification of the service of tourism and influence in the technical characteristics at the expense of the brand and market share, as well as misleading beneficiaries about the fact that the performance of the service of tourism, may depend activities tourist dramatically when submitting and sharing various services on the types of mutual relations the framework for moral distinct, in interaction or direct contact between producers of tourism services and tourists or their beneficiaries, in order to provide comfort and recreation a
... Show MoreBackground: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m
... Show MoreThis paper presents designing an adaptive state feedback controller (ASFC) for a magnetic levitation system (MLS), which is an unstable system and has high nonlinearity and represents a challenging control problem. First, a nonadaptive state feedback controller (SFC) is designed by linearization about a selected equilibrium point and designing a SFC by pole-placement method to achieve maximum overshoot of 1.5% and settling time of 1s (5% criterion). When the operating point changes, the designed controller can no longer achieve the design specifications, since it is designed based on a linearization about a different operating point. This gives rise to utilizing the adaptive control scheme to parameterize the state feedback controll
... Show MoreIn the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.
This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions