The identification of a bed’s lithology is fundamental to all reservoir characterization because the physical and chemical properties of the rock that holds hydrocarbons and/or water affect the response of every tool used to measure formation properties. The main purpose of this study is to evaluate reservoir properties and lithological identification of Nahr Umr Formation in Luhais well -12 southern Iraq. The available well logs such as (sonic, density, neutron, gamma ray, SP, and resistivity logs) are digitized using the Didger software. The petrophysical parameters such as porosity, water saturation, hydrocarbon saturation, bulk water volume, etc. were computed and interpreted using Techlog software. The lithology prediction of Nahr Umr Formation was carried out by appling IPSOM technique using density, neutron, and gamma ray logs. Nahr Umr Formation in well Luhais -12 was divided into three zones based on well logs interpretation and petrophysical Analysis: Zone-A, Zone-B, and Zone-C. The formation lithology is mainly composed of sandstone interlaminated with siltstone and shale according to interpretation of density, neutron, and gamma ray logs using IPSOM technique. Interpretation of formation lithology and petrophysical parameters shows that zone-C is characterized by clean sandstone with high porosity and water saturation whereas zone –B consists mainly of alternating shale beds with siltstone and sandstone with high porosity and water saturation less than zone –C and increasing of hydrocarbon saturation but Zone –A consists mainly of siltstone and sandstone layer with some of shale beds that contains hydrocarbon.
This work involves the preparation of high yield iminochalcon compounds (B1-B15) through two parts. The first part involves the preparation of 2,4-dihydroxy Chalcone (A1-A15) by the condensation of 2,4-dihydroxy acetophenone with aryl aldehyde in the presence of sodium hydroxide (40%) as a catalyst. The second part includes the preparation of iminochalcon from the condensation of p-hydroxy aniline with 2,4-dihydroxy chalcone derivatives )A1-A15) in the presence of some drops of conc. H2SO4. Thin-layer chromatography ((TLC) was used to control the chemical reaction . These new derivatives were characterized by using FT-IR and 1H-NMR spectroscopy. These synthesized
... Show MoreThis study focuses on the biodegradation of oxymatrine insecticide by some soil fungi isolated from four agriculture stations. The results showed that the highest degradation rate 94.66% was recorded by Ulocladium sp. at 10 days and A. niger recorded the lowest degradation rate 45.86%, while at 20 days Ulocladium sp. also showed the highest degradation rate 94.98% and the lowest degradation rate reached to 82.49% with A.niger. The mix (Exerohilum sp.+Ulocladium sp.) recorded the highest degradation rate of oxymatrine insecticide 90.22%, 88.51%, 85.34% at 4, 8 and 12 ppm.The use of mixed isolates enhanced the biodegradation process. There is no study of oxymatrine biodegradation
... Show MoreThis study uses an environmentally friendly and low-cost synthesis method to manufacture zinc oxide nanoparticles (ZnO NPs) by using zinc sulfate. Eucalyptus leaf extract is an effective chelating and capping agent for synthesizing ZnO NPs. The structure, morphology, thermal behavior, chemical composition, and optical properties of ZnO nanoparticles were studied utilizing FT-IR, FE-SEM, EDAX, AFM, and Zeta potential analysis. The FE-SEM pictures confirmed that the ZnO NPs with a size range of (22-37) nm were crystalline and spherical. Two methods were used to prepare ZnO NPs. The first method involved calcining the resulting ZnO NPs, while the second method did not. The prepared ZnO NPs were used as adsorbents for removing acid black 210
... Show MoreThis article includes designed and synthesized for bent-shaped liquid crystal molecules starting from 5,5-diethylpyrimidine-2,4,6(1H,3H,5H)-trione and two moles of chloroacetylchloride in N, N-dimethyl formamide (DMF) and triethylamine (TEA) to product compound [I] ,then reacted the later compound with two moles of 4-hydroxybenzonitrile to yield nitrile compound [II]. Likewise, reaction 5,5-diethylpyrimidine-2,4,6(1H,3H,5H)-trione and two moles of ethylchloroacetate with fused sodium acetate in ethanol to create an ester compound [III], and then the later compound was reacted with two moles of hydrazine hydrate in ethanol to obtained hydrazide acid compound [IV]. After that, the compound [IV] reacted with two moles of ethyl acetoacetate in
... Show MoreNew chalcones of -{ - - - y - - hi di z e- -y he y - - e e- - e- - - substituted phenyl have been prepared from condensation of a new of 4-[5-(4`-tolyl)1,3,4-thiadiazole-2-yl] benzaldehyde (which is synthesized by the reaction of 2- amino-5- (4`-tolyl) -1,3,4-thiadiazole and benzaldehyde) with 3- or 4- substituted acetophenones in alkaline medium. The physical, CHNS analysis and spectral data of the synthesized compounds were determined. The biological activity evaluated of new compounds showed that many of these compounds possess antiba
... Show MoreA multistep synthesis was established for the preparation of a new vanillic acid-1, 2, 4-1triazole-3-thiol conjugate (
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreCloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show More