ole in all sta
Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui
... Show Moreole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with
... Show MoreArabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio
... Show MoreSearch came (the employment of Arabic calligraphy in gold jewelry styles) four chapters, the first chapter of which dealt:A/research problem B/importance of research C/targets search D/ Define termsAs the aim of the research (to identify the employment of different forms of Arabic calligraphy on gold jewelry styles).It came in the second quarter (the theoretical framework and previous studies), some of the topics reviewed in which diversities researcher aesthetic and functional, and various uses that filled Arabic calligraphy.The third chapter outlining the researcher methodology and the research community, has a special form for the analysis of the samples are designed as form is offered on a number of experts in the field of jurisdicti
... Show MorePerhaps masculinity and femininity in our Arabic language are among the linguistic issues that have occupied the attention of researchers, ancient and modern. Many books, works, and research have been written on this subject, but there is still something in it that must be revealed, clarified, and established, as the ancients did not classify the feminine and masculine into real, metaphorical, auditory, analogical,
The research tackles the nature of relationship between the Orthodox Church and the state in the Russian Federation. At the beginning of the nineties of the last century, the church had been performed a different role in its relationship with the state, and it had an effect over the internal and foreign policies for the Russian Federation. In political history of Russia, the church’s existence became an evident too much in comparing with the previous historical period, starting with the educational and political system, whether through a symbolic participating roles as what happened in the inauguration ceremony to take over responsibility of the head of state or taking actual roles such as influencing on the process of holding elections d
... Show MoreCrude oil is one of the most important sources of energy in the world. To extract its multiple components, we need oil refineries. Refineries consist of multiple parts, including heat exchangers, furnaces, and others. It is known that one of the initial operations in the refineries is the process of gradually raising the temperature of crude oil to 370 degrees centigrade or higher. Hence, in this investigation the focus is on the furnaces and the corrosion in their tubes. The investigation was accomplished by reading the thickness of the tubes for the period from 2008 to 2020 with a test in every two year, had passed from their introduction into the work. Where the thickness of more than one point was measured on each tube in the sa
... Show MoreEach art has its own language. Per his style as an artist, which is characterized by the other. The methods differ and vary expressive art to another depending on the tools and methods used, and is a theatrical phenomenon did, and see, and touch, grasp, understand, and imagine, and emotion, and the blending of ideas and images. When unable to speak the language of the traditional theater For the delivery of a specific meaning or a single non-current at the time the highlight of our new language with a very wide area up to the extent of the unification of the languages of the world as it is in fine painting, it's the body of actor language, so it has become a mime art, which expressed Representative meanings reference and movement of vari
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreAbstract
The Umayyad poets tried to invest all artistic tools in order to achieve a measure of creativity in their texts. The phenomenon of visual composition is breaking the familiar writing system, with the aim of increasing the number of possible connotations. The visual in the Umayyad poetry tries to replace it through expression with the visual image, and its manifestations were manifested by the multiplication of punctuation marks in the body of the poetic text and the tearing of the single poetic line by cutting it into several sentences or repetition.
Keywords: visual formation, poetic writing, Umayyad poetry, recipien