Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressure gradient and clay volume, which were also established first, data such as gamma ray, density, resistivity, and sonic log data are also required. A key consideration in the design of certain wells is the forecasting of fracture pressure for wells drilled in the southern Iraqi oilfield of Buzurgan. The pressure abnormality is found in MA, MB21, MC1 and MC2 units by depending on pore pressures calculated from resistivity log. In these units, depths and its equivalent normal and abnormal pressure are detected for all sex selected wells; BUCS-47, BUCS-48, BUCS-49, BUCN-43, BUCN-51 and BBCN-52. For MA, MB21, MC1, and MC2 units, the highest difference in pore pressure values are 1698 psi @ 3750 m (BUCN-51), 3420 psi @ 3900 m (BUCN-51), 788 psi @ 3980 m (BUCS-49), and 5705 psi @ 4020 m (BUCN-52). On other hands, MB11 and MB12 units have normal pressure trend in all studied wells. Finally, the results show that the highest pore and fracture pressure values is existed in North dome, in comparison with that obtained in south dome of Mishrif reservoir at Buzurgan oilfield.
Background: The skin functions as a barrier to the external environment, damage to this barrier following a burn disrupts the innate immune system and increases susceptibility to bacterial infection. Objective: This study was carried out to determine the bacterial isolates and study their antimicrobial susceptibility in burned wound infections at one burn's hospital in Baghdad.Type of study:Cross-sectional study.Methods: The bacteria were identified at species level by using Analytic Profile Index (API) system and The antimicrobial susceptibility test was performed according to Kirby-Bauer (disk diffusion) technique.Results: Over a period of one year (from October 2014 to October 2015). Out of 848 patients with different degrees of burns
... Show MoreProfit is a goal sought by all banks because it brings them income and guarantees them survival and continuity, and on the other hand, facing commitments without financial crisis. Hence the idea of research in his quest to build scientific tools and means that can help bank management in particular, investors, lenders and others to predict financial failure and to detect early financial failures. The research has produced a number of conclusions, the most important of which is that all Islamic banks sample a safe case of financial failure under the Altman model, while according to the Springate model all Islamic banks sample a search for a financial failure except the Islamic Bank of Noor Iraq for Investment and Finance )BINI(. A
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreTransportation and distribution are the most important elements in the work system for any company, which are of great importance in the success of the chain work. Al-Rabee factory is one of the largest ice cream factories in Iraq and it is considered one of the most productive and diversified factories with products where its products cover most areas of the capital Baghdad, however, it lacks a distribution system based on scientific and mathematical methods to work in the transportation and distribution processes, moreover, these processes need a set of important data that cannot in any way be separated from the reality of fuzziness industrial environment in Iraq, which led to use the fuzzy sets theory to reduce the levels of uncertainty.
... Show MoreThe rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show MoreBackground: As a multifactorial disorder, temporomandibular joint (TMD) is difficult to diagnose, and multiple factors affect the joint and cause the temporomandibular disorder. Standardization of clinical diagnosis of TMD should be used to reach a definite clinical diagnosis; the condylar bone may degenerate in accordance with these disorders. Aims: Evaluate the correlation between the clinical diagnosis and degenerative condylar change (flattening, sclerosis, erosion, and osteophyte). Materials and Methods: A prospective study with a study group of 97 TMD patients (total of 194 joints) aged 20 to 50. Patients were sent to cone beam computed tomography (CBCT) to assess the degenerative condylar change. Results: No association was found bet
... Show MoreAmeloblastic carcinoma is a rare malignant odontogenic tumor that is further classified into being primary or secondary arising from a preexisting benign ameloblastoma. It affects the mandible in two thirds of the patients. there is no standard treatment protocol for this lesion but radical surgical excision with or without radiotherapy is reported in the majority of cases. In this paper we present a case of a 60 year old female diagnosed with ameloblastic carcinoma of the mandible that was treated by radical resection of the mandible with selective neck dissection and postoperative radiotherapy.