This study has been accomplished by testing three different models to determine rocks type, pore throat radius, and flow units for Mishrif Formation in West Qurna oilfield in Southern Iraq based on Mishrif full diameter cores from 20 wells. The three models that were used in this study were Lucia rocks type classification, Winland plot was utilized to determine the pore throat radius depending on the mercury injection test (r35), and (FZI) concepts to identify flow units which enabled us to recognize the differences between Mishrif units in these three categories. The study of pore characteristics is very significant in reservoir evaluation. It controls the storage mechanism and reservoir fluid properties of the permeable units while pore structure is a critical controlling factor for the petrophysical properties and multiphase-flow characteristics in reservoir rocks. Flow zone indicator (FZI) has been used to identify the hydraulic flow units approach (HFUs). Each (HFU) was reproduced by certain FZI and was supposed to have similar geological and petrophysical properties. The samples were from four lithofacies, mA, CRII, mB1, and mB2. Because of the wide range of cored-wells samples (20 wells), this paper is updated the previous studies and indicated some differences in the resulting categories. It was noticed as results of this study that the rocks types of the lower Mishrif were mostly ranged from wackestone to packstone in the upper part of mB2 which reflected mid-ramp facies while the upper part of mB2 referred to shoal facies and for the mB1 unit the rocks types mostly range from packstone to grainstone with some points as wackestone marked as shoal and rudist bioherm facies. Grainstone relatively decreases with the increasing of depth from upper to lower Mishrif while wackestone and packstone indicated increasing in the same direction. The unit mA is marked as mesopores and macropores, while megapores and macropores feature increased in mB1 which has been noticed in the northern part of West Qurna oilfield due to increasing shoal and rudist bioherm facies, the mB2 unit revealed increasing in mesoporous and decreasing in megaporous. The upper Mishrif (mA) has three flow units, while the lower Mishrif (mB1, mB2) has eight flow units four for each reservoir unit.
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show MoreThis study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreChemical pollution is a very important issue that people suffer from and it often affects the nature of health of society and the future of the health of future generations. Consequently, it must be considered in order to discover suitable models and find descriptions to predict the performance of it in the forthcoming years. Chemical pollution data in Iraq take a great scope and manifold sources and kinds, which brands it as Big Data that need to be studied using novel statistical methods. The research object on using Proposed Nonparametric Procedure NP Method to develop an (OCMT) test procedure to estimate parameters of linear regression model with large size of data (Big Data) which comprises many indicators associated with chemi
... Show MoreSummary:This article discusses the topic of phraseological units with the names of wild animals in the Russian and Arabic languages in the aspect of their comparative semantic and cultural analysis, since a comparative analysis of the meanings of phraseological units of the Arabic and Russian languages, detection of coincidences and differences in the compared languages, is an important method for studying linguoculturology, since phraseological units represent a reflection of culture in the language
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreBackground: The aim of this study was for estimation and comparism of masticatory efficiency in patient wearing heat cured acrylic and flexible base partial denture, finding out the role of peanuts and carrots on the measurement of chewing efficiency, and to find out whether the types of P.D. (being single or two opposing each other) has any effect on the masticatory performance. Materials and methods: Twenty partially edentulous patients were selected. Five of these patients were selected having Kennedy class I with no modification against natural dentition, other 5patients having Cl.I against Cl.I . The other 5 patients having Cl.III against natural dentition and the last 5 patients were with Cl.III against Cl.III. several ways were used
... Show MoreThis study focuses on the biodegradation of oxymatrine insecticide by some soil fungi isolated from four agriculture stations. The results showed that the highest degradation rate 94.66% was recorded by Ulocladium sp. at 10 days and A. niger recorded the lowest degradation rate 45.86%, while at 20 days Ulocladium sp. also showed the highest degradation rate 94.98% and the lowest degradation rate reached to 82.49% with A.niger. The mix (Exerohilum sp.+Ulocladium sp.) recorded the highest degradation rate of oxymatrine insecticide 90.22%, 88.51%, 85.34% at 4, 8 and 12 ppm.The use of mixed isolates enhanced the biodegradation process. There is no study of oxymatrine biodegradation
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o