The identification of a bed’s lithology is fundamental to all reservoir characterization because the physical and chemical properties of the rock that holds hydrocarbons and/or water affect the response of every tool used to measure formation properties. The main purpose of this study is to evaluate reservoir properties and lithological identification of Nahr Umr Formation in Luhais well -12 southern Iraq. The available well logs such as (sonic, density, neutron, gamma ray, SP, and resistivity logs) are digitized using the Didger software. The petrophysical parameters such as porosity, water saturation, hydrocarbon saturation, bulk water volume, etc. were computed and interpreted using Techlog software. The lithology prediction of Nahr Umr Formation was carried out by appling IPSOM technique using density, neutron, and gamma ray logs. Nahr Umr Formation in well Luhais -12 was divided into three zones based on well logs interpretation and petrophysical Analysis: Zone-A, Zone-B, and Zone-C. The formation lithology is mainly composed of sandstone interlaminated with siltstone and shale according to interpretation of density, neutron, and gamma ray logs using IPSOM technique. Interpretation of formation lithology and petrophysical parameters shows that zone-C is characterized by clean sandstone with high porosity and water saturation whereas zone –B consists mainly of alternating shale beds with siltstone and sandstone with high porosity and water saturation less than zone –C and increasing of hydrocarbon saturation but Zone –A consists mainly of siltstone and sandstone layer with some of shale beds that contains hydrocarbon.
The purpose of this study is to examine the effect of human resource diversity management practices on achieving entrepreneurship in Jordanian public universities. To achieve the aims of the study, a well-designed questionnaire was used for collecting data. The population of the study was (7433) faculty members (including different ranks such as professors, associate professors, assistant professors and lecturers) in Jordanian public universities. The study sample was selected through the use of a random sample, the questionnaire is distributed to a sample (of 400 with the percentage of 5%) selected by using a random sampling (350) copies of the questionnaire were collected, reaching about (87.5%) out of the sum total of the dist
... Show MoreResults of the current study demonstratedthat out of eighty-three isolatesof Pseudomonas aeruginosa,only twenty-five isolateswere resistant to five different antibiotics (of different classes) that were consequentlyconsideredmultidrug resistant isolates.These isolates developed variable susceptibility toward Eucalyptuscamaldulensisleavesoil (ECO). GC-MS analysis of ECOrevealed that the aromatic oil eugenol is the major constituent.However, the most frequent MIC was 0.39 µg/ml, while the lowest frequent MIC was 3.125 µg/ml.Moreover, this oil at ½ MIC (0.195µg/ml) increased the gene expression of exoU. Itis concluded from the outcomes of the studythat ECOmay cause severe damagewhen used to treat infections caused by P. aeruginosa.
... Show MoreNovel bidentate Schiff bases having nitrogen-sulphur donor sequence was synthesized from condensation of racemate camphor, (R)-camphor and (S)-camphor with Methyl hydrazinecarbodithioate (SMDTC). Its metal complexes were also prepared through the reaction of these ligands with silver and bismuth salts. All complexes were characterized by elemental analyses and various physico-chemical techniques. These Schiff bases behaved as uninegatively charged bidentate ligands and coordinated to the metal ions via ?-nitrogen and thiolate sulphur atoms. The NS Schiff bases formed complexes of general formula, [M(NS)2] or [M(NS)2.H2O] where M is BiIII or AgI, the expected geometry is octahedral for Bi(III) complexes while Ag(I) is expected to oxidized t
... Show MoreThis study aims to identify both the importance of using (LinkedIn) and its drawbacks for researchers and specialists in the field of information and knowledge technologies. The study relied mainly on the statistical method (analytical method) from the collection of data tools (questionnaire) that was distributed electronically (Google Forms) to the sample community of (55) instructors. The feedback received illustrates that (46) instructors among those who participated in the questionnaire subscribed to (LinkedIn) and the rest did not. Their data was analyzed statistically, and the general arithmetic mean and the hypothetical mean was extracted for them to achieve the objectives of the study and prove their hypotheses. The site positively
... Show MoreAbstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the
This research aims to analyze the indicators of spatial variation in the guide of health field in both Al-Adhamiyah and Rusafa districts according to the environmental and administrative units in 2016. The analysis was done by groups of health guide indicators. The objectives of the study were to identify the spatial variation of health services and assess the health situation for families following the environmental and administrative units of the studied area. Such objectives can be done by specifying the extent of the families’ consent to the type of services, measuring the cases of deprivation, and identifying the most deprived areas. The study has finally concluded that there is a clear spatial variation between the indicators and
... Show MoreBig data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreThe current research discussed biophysics data as a theoretical and applied knowledge base linking industrial design with the natural sciences at the level of applied strategies through which we can enrich the knowledge base of industrial design. The research focused on two main aspects of the scientific references for biophysics, namely: electromagnetism, and biomechanics. According to the performance and functional applications in designing the functions of industrial products at the electromagnetic level, it was found that remote sensing applications: such as fire sensors that were adopted from the insect (Black Beetle) and that their metaphors enable them to hear fire, and collision sensors, which were adopted from the insect
... Show MoreReferral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Many referral schemes are domain-specific and cannot be deployed in a general-purpose setting. This study proposes a two-dimensional (User × Item)-space multimode referral scheme, having an enormous client base but few articles on offer. Additionally, the design of the referral scheme is anchored on the and articles, as expressed by a particular client, and is a combination of affi
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More