The shale volume is one of the most important properties that can be computed depending on gamma ray log. The shale volume of Mishrif Formation (carbonate formation from middle Cenomanian- early Turonian) was studied for the regional area of the middle and southern parts of Iraq. The gamma ray log data from seventeen wells ( Kf-3,Kf-4, Ad-1,Ad -2,Dh-1, Bu-47, Ns-2, Ns-4, Am-1,Am-2,Hf-2,Hf-115,Mj-3,Mj-15, Su-7,Wq-15 and Lu-7) distributed in the study area were used to compute the shale volume of Mishrif Formation. From the available data of the considered wells, a regional isopach map of Mishrif Formation was obtained. The isopach map indicates that the maximum thickness of Mishrif Formation is located at the eastern part of the study area. The results of the CPI and the shale volume map, which were computed using the Techlog and surfer software, show that the maximum value of shale volume is located at the southern part of the study area (Su-7 well), while the minimum value is at the eastern part (Hf-2well). According to the classification of Kamel and Mabrouk (2003), Mishrif Formation seems to be a Shaly Formation in the study area, except Halfaya oil field at the eastern part of the study area, which seems as a Clear Formation. The top map of the shale marker bed, which appears in most studied wells, shows a regional trend of the formation toward the northeast. According to the variation of the thickness of the shale marker bed, the study area is divided into four zones.
يعد نظام الإدارة البيئية ( EMS ) على وفق المواصفة ISO 14001:2015 من الانظمة الإدارية الحديثة والمهمة في وقتنا الحالي، اذ هو أحد أدوات الأدارة البيئية بعّده مدخلاً للمعالجة أو الحد من المخاطر البيئية وآثارها، وبالخصوص الاثار الناجمة من الصناعة النفطية والتي تعد المصدر الرئيس للتلوث البيئي وهدر ونفاذ الموارد الطبيعية. تتجلى مشكلة الدراسة في ضعف عملية تشخيص والحد من مخاطر الج
... Show MoreCloud computing is a pay-as-you-go model that provides users with on-demand access to services or computing resources. It is a challenging issue to maximize the service provider's profit and, on the other hand, meet the Quality of Service (QoS) requirements of users. Therefore, this paper proposes an admission control heuristic (ACH) approach that selects or rejects the requests based on budget, deadline, and penalty cost, i.e., those given by the user. Then a service level agreement (SLA) is created for each selected request. The proposed work uses Particle Swarm Optimization (PSO) and the Salp Swarm Algorithm (SSA) to schedule the selected requests under budget and deadline constraints. Performances of PSO and SSA with and witho
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreABSTRACT Background: Cortical bone thickness is important for the stability of mini implants. Placing mini implants in sites of favorable cortical bone thickness would guarantee better initial stability and long-term success. The aim of this study was to investigate gender, side and jaw differences of the buccal cortical bone thickness as a guide for orthodontic mini screw placement. Materials and Methods: The sample was selected from the patients attending the Specialized Health Center in Al-Sadr City / 3D department. Thirty patients (15 males and 15 females) were selected and cone beam computerized tomographic images were done. Then the buccal cortical bone thickness was measured at thirteen inter radicular sites in the maxilla and mandib
... Show MoreExisting leachate models over–or underestimates leachate generation by up to three orders of magnitude. Practical experiments show that channeled flow in waste leads to rapid discharge of large leachate volumes and heterogeneous moisture distribution. In order to more accurately predict leachate generation, leachate models must be improved. To predict moisture movement through waste, the two–domain PREFLO, are tested. Experimental waste and leachate flow values are compared with model predictions. When calibrated with experimental parameters, the PREFLO provides estimates of breakthrough time. In the short term, field capacity has to be reduced to 0.12 and effective storage and hydraulic conductivity of the waste must be increased to
... Show MoreThis research is under the title (Construction Grammar in the Kurdish language), which in turn is an attempt to present grammar and Kurdish grammar from the perspective of the constructive of Cognitive Linguistics. The construction as a term in the Kurdish language base was not recent, as it was discussed in other schools in a specific way from the perspective of language schools, but the subject of construction with a perceived background includes specific purposes, which is how to build the linguistic base by being a template accessible to its speakers, and in the cases of speaking it, not to mention how it is perceived and the level it is familiar with by its speakers. The nominal purpose of the Construction is Unification of form-mea
... Show MoreIn the course of generating a library of open-chain epothilones, we discovered a new class of small molecule anticancer agents that has no effect on tubulin but instead kills selected cancer cell lines by harnessing reactive oxygen species in an iron-dependent manner.
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreAbstract:
Objective: To know the effect of televised media violence on the relationship of Children's primary school with mates and identify association between the demographic characteristics and socioeconomic status for primary school children and their relation with exposure to televised violence media.
Methodology: simple probability sample of 221 children were selected from 1425 children are learning in schools in Al-Nasiriyah City.
Results: Results of the current study showed that (53.8%) of children exposed to Televised media violence be relationship with their mates weak, (46.2%) of them have their relationship with their mates good, as well as the study showed that the presence significant correlation with males genders