Petrophysical properties including volume of shale, porosity and water saturation are significance parameters for petroleum companies in evaluating the reservoirs and determining the hydrocarbon zones. These can be achieved through conventional petrophysical calculations from the well logs data such as gamma ray, sonic, neutron, density and deep resistivity. The well logging operations of the targeted limestone Mishrif reservoirs in Ns-X Well, Nasiriya Oilfield, south of Iraq could not be done due to some problems related to the well condition. The gamma ray log was the only recorded log through the cased borehole. Therefore, evaluating the reservoirs and estimating the perforation zones has not performed and the drilled well was abandoned. This paper presents a solution to estimate the missing open-hole logs of Mishrif Formation including sonic, neutron, density and deep resistivity using supervised Artificial Neural Network (ANN) in Petrel software (2016.2). Furthermore, the original gamma-ray log along with the predicted logs data from ANN models were processed, and the petrophysical properties including volume of shale, effective porosity and water saturation were calculated to determine the hydrocarbon zones. The ANN Mishrif Formation models recorded coefficient of determination (R2) of 0.65, 0.77, 0.82, and 0.04 between the predicted and the tested logs data with total correlations of 0.67, 0.91, 0.84 and 0.57 for sonic, neutron, density, and resistivity logs respectively. The best possible hydrocarbon-bearing zone ranges from the depth of about 1980-2030 m in the mB1unit. The ANN provides a good accuracy and data matching in clean and non-heterogeneous formations compared to those with higher heterogeneity that contain more than one type of lithology. The Ns-X Well can, therefore, be linked to the development plans of the Nasiriya Field instead of neglect it.
The research aims to identify the degree of the availability of knowledge, skill and ability as components of human capital, in addition to stand at the level of strategic agility upon tourism and travel agencies company of Jordan, the impact of human capital on strategic agility has been tested through distribution of a questionnaire on a Randomly Sample from Workers in Jordan tourist Companies of (349),a number of statistics techinces have been used simple liner Regrision and Multiplayer regession, it has shown that the degree of knowledge, ability and skill availability was high, and the same applies on strategic agility components, and shown out that there is a statistically significant impact between human capital and strate
... Show MoreThis work evaluates the economic feasibility of various production scenarios for the Zubair reservoir in the Kifl oil field using cash flow and net present value (NPV) calculations. The Kifl field is an exploratory field that has not yet been developed or assessed economically. The first well was drilled in 1960, and three other wells were later drilled to assess the oil accumulation, so in this research, Different production scenarios were evaluated economically. These scenarios were proposed based on the reservoir model of the Zubair formation in the field. The research methodology used QUE$TOR software to estimate capital expenditures (CapEx) and operating expenditures (OpEx) based on field-level data, production prof
... Show MoreThe present study analyzes the effect of couple stress fluid (CSF) with the activity of connected inclined magnetic field (IMF) of a non-uniform channel (NUC) through a porous medium (PM), taking into account the sliding speed effect on channel walls and the effect of nonlinear particle size, applying long wavelength and low Reynolds count estimates. The mathematical expressions of axial velocity, stream function, mechanical effect and increase in pressure have been analytically determined. The effect of the physical parameter is included in the present model in the computational results. The results of this algorithm have been presented in chart form by applying the mathematical program.
A large number of researchers had attempted to identify the pattern of the functional relationship between fertility from a side and economic and social characteristics of the population from another, with the strength of effect of each. So, this research aims to monitor and analyze changes in the level of fertility temporally and spatially in recent decades, in addition to estimating fertility levels in Iraq for the period (1977-2011) and then make forecasting to the level of fertility in Iraq at the national level (except for the Kurdistan region), and for the period of (2012-2031). To achieve this goal has been the use of the Lee-Carter model to estimate fertility rates and predictable as well. As this is the form often has been familiar
... Show MoreReliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More