This study has been accomplished by testing three different models to determine rocks type, pore throat radius, and flow units for Mishrif Formation in West Qurna oilfield in Southern Iraq based on Mishrif full diameter cores from 20 wells. The three models that were used in this study were Lucia rocks type classification, Winland plot was utilized to determine the pore throat radius depending on the mercury injection test (r35), and (FZI) concepts to identify flow units which enabled us to recognize the differences between Mishrif units in these three categories. The study of pore characteristics is very significant in reservoir evaluation. It controls the storage mechanism and reservoir fluid properties of the permeable units while pore structure is a critical controlling factor for the petrophysical properties and multiphase-flow characteristics in reservoir rocks. Flow zone indicator (FZI) has been used to identify the hydraulic flow units approach (HFUs). Each (HFU) was reproduced by certain FZI and was supposed to have similar geological and petrophysical properties. The samples were from four lithofacies, mA, CRII, mB1, and mB2. Because of the wide range of cored-wells samples (20 wells), this paper is updated the previous studies and indicated some differences in the resulting categories. It was noticed as results of this study that the rocks types of the lower Mishrif were mostly ranged from wackestone to packstone in the upper part of mB2 which reflected mid-ramp facies while the upper part of mB2 referred to shoal facies and for the mB1 unit the rocks types mostly range from packstone to grainstone with some points as wackestone marked as shoal and rudist bioherm facies. Grainstone relatively decreases with the increasing of depth from upper to lower Mishrif while wackestone and packstone indicated increasing in the same direction. The unit mA is marked as mesopores and macropores, while megapores and macropores feature increased in mB1 which has been noticed in the northern part of West Qurna oilfield due to increasing shoal and rudist bioherm facies, the mB2 unit revealed increasing in mesoporous and decreasing in megaporous. The upper Mishrif (mA) has three flow units, while the lower Mishrif (mB1, mB2) has eight flow units four for each reservoir unit.
In this paper, we estimate the survival function for the patients of lung cancer using different nonparametric estimation methods depending on sample from complete real data which describe the duration of survivor for patients who suffer from the lung cancer based on diagnosis of disease or the enter of patients in a hospital for period of two years (starting with 2012 to the end of 2013). Comparisons between the mentioned estimation methods has been performed using statistical indicator mean squares error, concluding that the survival function for the lung cancer by using shrinkage method is the best
Government spending is the tool that the state uses to achieve its various goals. The research aims to identify the most important determinants of government spending in Iraq and to indicate the type and nature of the relationship between government spending and its determinants, which will contribute to understanding the movement of government spending. The results of the co-integration test using the border test methodology showed that the variables of population growth and oil prices have a long-term effect on government spending while inflation is not significant in the long run, and that 47% of the equilibrium imbalance (short-term imbalance) in government spending in the previous period (t-) can be corrected in the current period (t)
... Show MoreThe study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,
... Show MoreThis paper presents the Taguchi approach for optimization of hardness for shape memory alloy (Cu-Al-Ni) . The influence of powder metallurgy parameters on hardness has been investigated. Taguchi technique and ANOVA were used for analysis. Nine experimental runs based on Taguchi’s L9 orthogonal array were performed (OA),for two parameters was study (Pressure and sintering temperature) for three different levels (300 ,500 and 700) MPa ,(700 ,800 and 900)oC respectively . Main effect, signal-to-noise (S/N) ratio was study, and analysis of variance (ANOVA) using to investigate the micro-hardness characteristics of the shape memory alloy .after application the result of study shown the hei
... Show MoreAbstract
The present paper focuses in a particular on the study of the biochar production conditions by the thermal pyrolysis of biomass from local Iraqi palm fronds, in the absence of oxygen. The biochar product can be used as soil improvers. The effect of temperature on the extent of the thermal pyrolysis process was studied in the range from 523 to 773K with a residence time of 15 minutes and nitrogen gas flow rate of 0.1 l/min. The produced biochar was characterized as will as biomass and degradation products. The results showed that the rate of biochar production decreases with the increasing in temperature, also it was noted that the normalized biochar surface area and pore size increases with the increasin
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThis paper presents the results of the slope failure analyses from fracture distributions and their relation to tectonic activity; the analytical results have indicated that the phenomena of plane failure, wedge failure and toppling failure can occur at almost of the survey sites within the study area.
The statistical data show that the fracture orientation mainly develop in the E-W, N-S and NW-SE due to the influence of tectonic activity. The occurrence of them together with the rock slope surface orientation has formed plane failure on the slope surface of the 3B highway in the E-W direction and the types of wedge failure and toppling failure on the slope surface of the highw
... Show More