The main parameter that drives oil industry contract investment and set up economic feasibility study for approving field development plan is hydrocarbon reservoir potential. So a qualified experience should be deeply afforded to correctly evaluate hydrocarbons reserve by applying different techniques at each phase of field management, through collecting and using valid and representative data sources, starting from exploration phase and tune-up by development phase. Commonly, volumetric calculation is the main technique for estimate reservoir potential using available information at exploration stage which is quite few data; in most cases, this technique estimate big figure of reserve. In this study case, volumetric calculation estimate gas initial in place (GIIP) value almost two times bigger than other techniques estimation of actual reservoir potential; it is a result of Asphiltena “Bitumen” existing in reservoir interval which occupied part of matrix pore and fill some fractures. This investigation is raised up at early field production life: material balance calculation and run simulation analysis are applied to re-assessment and tune-up reservoir potential; both techniques are set up almost same GIIP value which principally tuned to actual reservoir dynamic energy behavior. Finally, material balance should be viewed as a complement to simulation, not as a competing approach, and using both to improve analysis of hydrocarbon reservoirs.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreObjectives: To assess nurses-midwives knowledge and performance regarding immediate newborn care in delivery rooms, and to identify the relationship between nurses-midwives knowledge and performance and their socio-demographic and professional variables regarding immediate newborn care.
Methodology: A descriptive study was conducted from 1st of October, 2019 to 20TH of October, 2020 at three maternity teaching hospitals in Baghdad city/Al-Russafa Health Directorate: Al-Elwiya Maternity Teaching Hospital, Fatema Al- Zahra Maternity and Pediatric Hospital, Al- Za'faraniyah General Hospital. Non-probability (purposive sample) include
... Show MoreBackground: Periodontitis and Atherosclerosis Cardiovascular disease are chronic inflammatory diseases which are highly prevalent. During the last two decades, there has been an increasing interest in the impact of oral health on atherosclerosis and subsequent cardiovascular disease.Aims of the study wereto evaluate the periodontal health status in study groups (Atherosclerotic cardiovascular disease patients with chronic periodontitis and patients having chronic periodontitis),to estimate the serum levels of Matrixmetalloproteinase-8(MMP-8) and high sensitive C-reactive protein(hs CRP) in study and control groups and compare between them. Also,test the correlation between the serum levels of MMP-8 and hs CRP with clinical periodontal par
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The study aimed to study the role of technology in the production of the mural photography, and to develop its concept to the viewer, through the achievement of the aesthetic and functional vision. Through this study, some types of these techniques, which are organically related to architecture, were identified.
The mural photography includes a huge amount of techniques, and methods, and the researcher presented them through five techniques: (AlTamira, Alfresk, acrylic, mosaic, and glass art, which takes the architectural character.
The research consists of:
Methodological framework: research problem, research objectives, research limits, importance of research, and definition of terms.
Theoretical framewo
... Show MoreIn this research, non-thermal plasma system of argon gas is designed to work at normal atmospheric pressure and suitable for work in medical and biotechnological applications. This technique is applied in the treatment of the Staphylococcus epidermidis bacteria and show the role of the flow rate of Argon gas on the killing rate of bacteria, and it obtained a 100 % killing rate during the time of 5 minutes at the flow Argon gas of 5 liters/ min.
An evaluation for the performance of model pile embedded in expansive soil was investigated. An extensive testing program was planned to achieve the purpose of this research. Therefore, special manufactured system was prepared for studying the behavior of model pile having different length to diameter ratios (L/D). Two types of piles were used in this research, straight shaft and under reamed piles. The effect of model pile type, L/D ratio and number of wetting drying cycles were studied. It is observed that significant reductions in pile movement when under reamed piles were considered. A proposed design charts was presented for straight shaft and under reamed piles to estimate the length of both types of piles that is requi
... Show More