Reservoir fluids properties are very important in reservoir engineering computations such as material balance calculations, well testing analyses, reserve estimates, and numerical reservoir simulations. Isothermal oil compressibility is required in fluid flow problems, extension of fluid properties from values at the bubble point pressure to higher pressures of interest and in material balance calculations (Ramey, Spivey, and McCain). Isothermal oil compressibility is a measure of the fractional change in volume as pressure is changed at constant temperature (McCain). The most accurate method for determining the Isothermal oil compressibility is a laboratory PVT analysis; however, the evaluation of exploratory wells often require an estimate of the fluid behavior prior to obtaining a representative reservoir sample. Also, experimental data is often unavailable.Empirical correlations are often used for these purposes.
This paper developed a new mathematical model for calculating undersaturated oil compressibility using 129 experimentally obtained data points from the PVT analyses of 52 bottom hole fluid samples from Mishrif reservoirs in the southern Iraqi oil fields. The new undersaturated oil compressibility correlation developed using Statistical Analysis System (SAS) by applying nonlinear multiple regression method. It was found that the new correlation estimates undersaturated oil compressibility of Mishrif reservoir crudes in the southern Iraqi oil fields much better than the published ones. The average absolute relative error for the developed correlation is 7.16%.
Background: Breast cancer is the most frequently diagnosed malignancy and the second leading cause of mortality among women in Iraq forming 23% of cancer related deaths. The low survival from the disease is a direct consequence to the advanced stages at diagnoses. Aim: To document the composite stage of breast cancer among Iraqi patients at the time of diagnosis; correlating the observed findings with other clinical and pathological parameters at presentation. Patients and Methods: A retrospective study enrolling the clinical and pathological characteristics of 603 Iraqi female patients diagnosed with breast cancer. The composite stage of breast cancer was determined according to UICC TNM Classification System of Breast Cancer and the Ameri
... Show MoreTwo dwarf snakes were discovered, Eirenis thospitis Schmidtler & Lanza from Sereen mountain, north east of Arbil and E. rothii Jan from Saffin mountain North of Arbil city North of Iraqi Kurdistan. Supported by description and important notes on variation. In addition summarized list for 9 species of the genus Eirenis Jan in Iraq is also presented.
The Battle of Kadesh is replete with many military arrangements that reflect the tremendous development of war preparations in the thirteenth century BC; where the expressive pictures the Egyptians left on some of the walls of their temples show the tremendous ability to organize and divide the forces and the great development that affected the war machine. Furthermore, the text accompanied these pictures reveal some news about that battle, which is considered one of the most important wars in the ancient world. Thus, the importance of the study lies in the fact that it examines one of the most important battles of the ancient Near East, the results of which had great repercussions on the region. This is because it is the most abundant B
... Show MorePore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show MoreBuilding numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More