This study aims to evaluate reservoir characteristics of Hartha Formation in Majnoon oil field based on well logs data for three wells (Mj-1, Mj-3 and Mj-11). Log interpretation was carried out by using a full set of logs to calculate main petrophysical properties such as effective porosity and water saturation, as well as to find the volume of shale. The evaluation of the formation included computer processes interpretation (CPI) using Interactive Petrophysics (IP) software. Based on the results of CPI, Hartha Formation is divided into five reservoir units (A1, A2, A3, B1, B2), deposited in a ramp setting. Facies associations is added to well logs interpretation of Hartha Formation, and was inferred by a microfacies analysis of thin sections from core and cutting samples. The CPI shows that the A2 is the main oil- bearing unit, which is characterized by good reservoir properties, as indicated by high effective porosity, low water saturation, and low shale volume. Less important units include A1 and A3, because they have low petrophysical properties compared to the unit A2.
The fish assemblage in the East Hammar marsh was studied during December 2009 to May 2010. The fish fauna of the marsh consisted of 17 native, 23 marine (49%) and seven alien species. The dominant species were Liza abu (14.6%), Carassius auratus (13.4%) and Thryssa mystax (11.2%). The resident species formed 44.7%, occasional species 36.1% and seasonal species 19.2% of the total number of fish species. Fish species diversity index ranged from 1.28 to 2.61, richness from 1.98 to 4.50 and evenness from 0.45 to 0.78. Salinity ranged from 1.45 to 7.74‰. The increase in the proportion of marine species (49%) in the fish assemblage due to marine waters progress from Arabian Gulf had an impact on the values of ecological indices and the
... Show MorePhytoplankton assemblage in relation to physical and chemical characteristics of water in Al-Auda marsh of Maysan province southern Iraq was assessed from November 2012 to July 2013. Six sampling sites were chosen to examine all phytoplankton species in the study area. A total of 246 species and seventy-five genera have been recognized belonging to twelve phytoplankton classes as follows: Bacillariophyceae (106 taxa), Chlorophyceae (34 taxa), Euglenophyceae (29 taxa), Cyanophyceae (29 taxa), Conjugatophyceae (19 taxa), Mediophyceae (10 taxa), Cryptophyceas (5 taxa), Coscinodiscophyceae (4 taxa), Chrysophyceae (4 taxa), Dinophyceae (3 taxa), Trebouxiophyceae (2 taxa) whereas Compsopogonophyceae record
Concentration of natural occurring radioactive material (NORM) in Markazia Degasing Station in North Rumaila oilfield (NDS) was measured in this study. Then, radiological assessment due to existing of NORM in different samples including soil, sludge, scale, oil, and water collected from different stages of oil and gas production NDS was done. Radioactivity concentration of Ra-226, Th-232 and K-40 were measured using gamma spectrometry system based on HPGe detector with efficiency of 30%. The results show that some locations within NDS are contaminated with NORM. The activity in Bq/kg of Ra-226, Th-232 and K-40 range between 15.19 in oil to 68.73 in sludge, 8.5 in oil to 23.45 in sludge and 80.23 in oil to 319.73 in saline water samples r
... Show MoreWater pollution is an issue that can be exacerbated by drought as increased concentrations of unwanted substances are a consequence of lower water levels. Polluted water that flows into natural marshlands leads to the deposition of pollutants in the interior of the marsh. Here we present evidence that the interior of the Central Marsh (CM) in southern Iraq suffers from higher levels of pollution than areas closer to the source of water entering the marsh (the Euphrates River). A 1.7m embankment that halts the flow of the Euphrates is only infrequently breached and so the CM is effectively the terminal destination of the waters (and their associated pollutants and agricultural waste) flowing from the West of Iraq.
A range of water
... Show MorePredicting vertical stress was indeed useful for controlling geomechanical issues since it allowed for the computation of pore pressure for the formation and the classification of fault regimes. This study provides an in-depth observation of vertical stress prediction utilizing numerous approaches using the Techlog 2015 software. Gardner's method results in incorrect vertical stress values with a problem that this method doesn't start from the surface and instead relies only on sound log data. Whereas the Amoco, Wendt non-acoustic, Traugott, average technique simply needed density log as input and used a straight line as the observed density, this was incorrect for vertical computing stress. The results of these methods
... Show MoreCrime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.