Asmari is the main productive reservoir in Abu Ghirab oilfield in the south-east part of Iraq. It has history production extends from 1976 up to now with several close periods. Recently, the reservoir suffers some problems in production, which are abstracted as water production rising with oil production declining in most wells. The water problem type of the field and wells is identified by using Chan's diagnostic plots (water oil ratio (WOR) and derivative water oil ratio (WOR') against time). The analytical results show that water problem is caused by the channeling due to high permeability zones, high water saturation zones, and faults or fracturing. The numerical approach is also used to study the water movement inside the reservoir. A three dimensional geological and a three phase reservoir model was constructed for Asmari reservoir. The simulation model was used to visualize the water front advance in order to evaluate the water production structurally. The numerical results also show that the channeling is the main cause of water production, as well as, oil-water contact advance problem was noted due to fault sealing behavior effects.
Voice studies are one of the sensory studies of their first association with auditory taste, which broadcasts its connection to the most sensory point contained in the physical corners, and in order to satisfy our conscience from these fundamental voices, we searched for in modern contexts, high proportions related to the words of Muhammadiyah, so we are looking for (events In the hadiths of the Prophet (peace be upon him), to settle our journey when the true adhkaar received from the Prophet, peace be upon him, and to control us start a journey through which we repeat between the cities of audio repetitions, sometimes we find ourselves have stood at the entrance of what corresponds to the sounds between the title of the Hadith and its t
... Show MoreBackground: The vaginal microbial ecosystem stability preclude many other organisms but sometimes the vaginal micro biota is disturbed and this cause change in the normal
balance causing symptoms of vulvuvaginitis like abnormal or increased vaginal discharge, redness and itching.
Objective: To prove C. albicans presence in their vagina clinically and laboratory by culture of vaginal swab on two media.
Type of the study: This study is a case control study
Methods: This study is a case control study in which 100 clinically patient women admitted to maternity hospital in kalar city and khanaqin hospital during the pe
... Show MoreExtracting, studying and interpreting the morphological database of a basin is a basic building block for building a correct geomorphological understanding of this basin. In this work, Arc GIS 10.8 software and SRTM DEM satellite images were used. The principle of data integration was adopted by extracting the quantitative values of the morphometric characteristics that are affected by the geomorphological condition of the studied basin, then eliciting an optimal conception of the geomorphological condition of the basin from the meanings and connotations of these combined transactions. Hypsometric integration was extracted for each region in the basin separately with the value of integration of the plot curve for the relative heights of
... Show MoreBefore the unit environmental problems serious the issues of the environment and conservation of contemporary issues important in the developed and developing worlds, it was natural that leads increasing global awareness to alert a group of intellectuals, scientists and politicians to the seriousness of this problem and the call to take steps deeper and more comprehensive with respect to the environment humanitarian based on the study of the various elements of this environment and a greater understanding of the relationships among them, and on this basis, steps have been taken to target the environment and to identify problems and make efforts to achieve the goals I: stop the deterioration of the environment and the second impro
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreThere continues to be a need for an in-situ sensor system to monitor the engine oil of internal combustion engines. Engine oil needs to be monitored for contaminants and depletion of additives. While various sensor systems have been designed and evaluated, there is still a need to develop and evaluate new sensing technologies. This study evaluated Terahertz time-domain spectroscopy (THz-TDS) for the identification and estimation of the glycol contamination of automotive engine oil. Glycol contamination is a result of a gasket or seal leak allowing coolant to enter an engine and mix with the engine oil. An engine oil intended for use in both diesel and gasoline engines was obtained. Fresh engine oil samples were contaminated with fou
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreDiabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.