The L. Cretaceous succession is the main reservoir rock in the south of Iraq. Although the upper Jurassic Sargelu Formation is the main source rock in this area; however, the organic-rich interval within the studied succession, is contribute in these huge accumulations of petroleum. The pyrolysis parameters of the succession; Sulaiy, yamama, Zubair, and Nahr Umr formations showed that the main kerogen type is type III and II with moderate to good HI, which they refer to gas and/or oil prone especially in Zubair, Nahr Umr, and Sulaiy formations. The quantity parameters indicate potential source intervals in respect to (TOC). The maturity parameters suggest the threshold and peak of petroleum generation, which Tmax values ranged around 430-450 ºC, as well as the Ro values ranged 0.5 to 1.0. The Maturity factors is enhanced by PI (0.1 -0.4), which the main values are located in the oil window.The software modeling, namely PetroMod, assigned a transformation ratio up to 90% in respect to Sulaiy and Yamama formations, while it is around 5-30 % for Ratawi, Zubair, and Shuaiba formations. As though, Nahr Umr is less than 5% of transformation ratio. These facts indicates that Sulaiy and Yamama formations are within the peak oil generation, however, Ratawi, Zubair, and Shuaiba, and Nahr Umr formations are within the start.The generated oil migrates up dip toward the dome of West Qurna field, but the existence of longitudinal and transverse fault system in the area may lead to accumulate oil in the directions NE and SW for the field.
The high bounce activity according to the fosbery way is regarded as of the difficult sports concerning its way of training and perfection due to hard technique of its performance on one hand and because it depends on the player’s ability to overcome body weight resistance against the gravity. In addition to the strong ability to control the body posture when leaving the land and flying over the barrier. This activity needs to high plosion power at the moment of bouncing and this plosion depends on the period of bouncing, so the two researchers aimed to use a mechanical bouncing platform and an electronic one through several training by one foot and both feet in different directions and positions in order to reduce the time of bouncing an
... Show MoreWhile many educators are highly focused on state test, it is important to consider that
over the course of a year, instructors can build in many opportunities to assess how learners
are learning. Therefore, assessment techniques are considered a good method to get benefit
for both instructors and learners in the process of teaching and learning. The sample consists
of 27 learners who participated in TOEFL training course in the Development and Continuous
Education Centre. Validity and reliability were verified.
To fulfill the aims and verify the hypothesis which reads as follows” It is hypothesized
that the TOEFL learners' scores will not be increased after TOEFL course training.” T-test
for two dependent samp
Abstract
Through this study, I tried to identify the grammatical efforts of one of the most important authors of the footnotes that were built on the luminous benefits marked with (Explanation of Mulla Jami in Grammar), and he is Sheikh Isamah Allah Al-Bukhari, who died in the eleventh century AH, trying as much as possible to stay away from the path of tradition in repeating the efforts of Those who preceded me in explaining the grammatical efforts of many grammarians, and perhaps what helped me in this is the characteristics that characterize the notes owners that may distinguish them from other owners of grammatical authorship, as a result of what characterized the personality of the notes owners from the predominance of the in
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
A high percentage of existing buildings in Iraq are traditional buildings, yet there is approximately no such green building in Baghdad or other governorates. Most of these buildings require urgent upgrading to increase their performance (operationally, economically, and environmentally), also the building owners looking for identifying and implementing many of the green building measures to reduce the operational and maintenance costs of their buildings. The decision-makers need to support the possibility of achieving sustainable measures of existing building rating systems such as LEED or BREEAM, and that would require an optimization model. The goal of this study is to maximize the
Objective: Assessment of health problems and identify demographical information to elderly. Methodology:
it is a descriptive study, data were collected by the researchers depended on the direct interview with the
elderly by using the study instrument (questionnaire) as well as review the records of the geriatric.
Results: The majority of study sample (66%) were males and (24.3%) were within age group (70-74) years,
(44.7%) were widows, and (41.7%) did not read and write. This study applied the international classification
of diseases(short-table) in (11) items, which stated that most of the elderly were complaining from
health problems: debility of hearing (80.65%), eczema or allergies (69.35%), debility of vision (66.9
Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.
Reservoir fluids properties are very important in reservoir engineering computations such as material balance calculations, well testing analyses, reserve estimates, and numerical reservoir simulations. Isothermal oil compressibility is required in fluid flow problems, extension of fluid properties from values at the bubble point pressure to higher pressures of interest and in material balance calculations (Ramey, Spivey, and McCain). Isothermal oil compressibility is a measure of the fractional change in volume as pressure is changed at constant temperature (McCain). The most accurate method for determining the Isothermal oil compressibility is a laboratory PVT analysis; however, the evaluation of exploratory wells often require an esti
... Show More