The main aim of this study is to evaluate the remaining oil in previously produced zones, locate the water productive zone and look for any bypassed oil behind casing in not previously perforated intervals. Initial water saturation was calculated from digitized open hole logs using a cut-off value of 10% for irreducible water saturation. The integrated analysis of the thermal capture cross section, Sigma and Carbon/oxygen ratio was conducted and summarized under well shut-in and flowing conditions. The logging pass zone run through sandstone Zubair formation at north Rumaila oil field. The zones where both the Sigma and the C/O analysis show high remaining oil saturation similar to the open hole oil saturation, could be good oil zones that do not appear to be water flooded. The zones where the Sigma analysisshows high residual oil saturation, which is close to open hole oil saturation and the C/O analysis, show medium residual oil saturation; this could indicate that these zones were fresh water flooded to a certain extent and they still keep some residual oil. If the C/O analysis shows low residual oil saturation, it indicates that these zones were probably fresh water flooded thoroughly. If both Sigma analysis and the C/O analysis show medium residual oil saturation, most probably these zones were saline water flooded to a certain extent and they still keep some residual oil.
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe bound radial wave functions of Cosh potential which are the solutions to the radial part of Schrodinger equation are solved numerically and used to compute the size radii; i.e., the root-mean square proton, neutron, charge and matter radii, ground density distributions and elastic electron scattering charge form factors for nitrogen isotopes 14,16,18,20,22N. The parameters of such potential for the isotopes under study have been opted so as to regenerate the experimental last single nucleon binding energies on Fermi's level and available experimental size radii as well.
In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show MoreThe analysis of the root cause techniques is a reasonable option to be made to assess the root causes of the funding of construction projects. There are a variety of issues related to financing in construction industries in Iraq. The root,cause analysis is the impact of security and social conditions on financial funding. Variety tools of root cause analysis have originated from literature, as common methods for the detection of root causes. The purpose of this study was to identify and diagnose causes that lead to obstruction of financial funding in the construction projects in the republic of Iraq from the contractors' point of view and their interaction with a number of variables. The study diagnosed nine causes of fi
... Show MoreA genetic algorithm model coupled with artificial neural network model was developed to find the optimal values of upstream, downstream cutoff lengths, length of floor and length of downstream protection required for a hydraulic structure. These were obtained for a given maximum difference head, depth of impervious layer and degree of anisotropy. The objective function to be minimized was the cost function with relative cost coefficients for the different dimensions obtained. Constraints used were those that satisfy a factor of safety of 2 against uplift pressure failure and 3 against piping failure.
Different cases reaching 1200 were modeled and analyzed using geo-studio modeling, with different values of input variables. The soil wa
Reservoir characterization plays a crucial role in comprehending the distribution of formation properties and fluids within heterogeneous reservoirs. This knowledge is instrumental in constructing an accurate three-dimensional model of the reservoir, facilitating predictions regarding porosity, permeability, and fluid flow distribution. Among the various methods employed for reservoir characterization, the hydraulic flow unit stands out as a widely adopted approach. By effectively subdividing the reservoir into distinct zones, each characterized by unique petrophysical and geological properties, hydraulic flow units enable comprehensive reservoir analysis. The concept of the flow unit is closely tied to the flow zone indicator, a cr
... Show MorePseudomonas aeruginosa has variety of virulence factors that contribute to its pathogenicity. Therefore, rapid detection with high accuracy and specificity is very important in the control of this pathogenic bacterium. To evaluate the accuracy and specificity of Polymerase Chain Reaction (PCR) assay, ETA and gyrB genes were targeted to detect pathogenic strains of P. aeruginosa. Seventy swab samples were taken from patients with infected wounds and burns in two hospitals in Erbil and Koya cities in Iraq. The isolates were traditionally identified using phenotypic methods, and DNA was extracted from the positive samples, to apply PCR using the species specific primers targeting ETA, the gene encoding for exotoxin A, and gyrB gene. The res
... Show More