The aim of this study is to identify the effect of particle size and to increase the concentration of Iraqi bentonite on rheological properties in order to evaluate its performance and to know if it can be used as drilling fluid without additives or not. In this study, Iraqi bentonite was carried out by mineral composition (XRD), chemical composition (XRF) and Particle size distribution (PSD), and its rheological properties were measured at different particle size and concentration. The results showed that when the particle size of Iraqi bentonite decreased, and the rheological properties were increased with increased concentration of Iraqi bentonite. Also, Iraqi bentonite was unable to use as drilling fluid without certain additives.
... Show MoreThe specific activity of 29 soil samples collected from Fuel
Fabrication Facility FFF at AL-Tuwaitha site, 20 km south of
Baghdad were determined using HPGe detector in a low background
configuration, it's relative efficiency of 40%, and resolution of 2keV
for the 1332 keV gamma ray emission of 60Co. The range of activity
concentrations of 226Ra, 232Th and 40K were between (12.56-31.96),
(10.2-18.4) and (47.47-402.1) Bq/kg respectively. In order to assess
any radiological hazard to human health, the absorbed gamma dose
rate D in air at 1m above the ground surface was calculated in the
range (18.87 to 36.46) nGy/h; the outdoor annual effective dose
equivalent AEDE was evaluated to vary from 0.0039 to 0.0076
It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree). This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method to prove th
... Show MoreAbstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreOpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MoreIn this work (paper), we investigate about the robustness of the modified divergence Information Criterion (MDIC), which proposed by Mantalos, Mattheou and Karagrigoriou (2008), to determine the probability of the Criterion picking up the true lag for Autoregressive process, when the error term of this process is normally and Non normally distributed. We obtained the results for different sample sizes by using simulation.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper, SiO2 nanoparticles thin films were synthesised at different PH values of solution by sol gel method at fixed temperature (25oC) and molar ratio (R =H2O/precursor) of (Tetra Ethyl Ortho Silicate) TEOS as precursor at (R=1). The structure and optical properties of the thin films have been investigated. All thin films were tested by using X-RAY diffraction. All X-RAY spectrum can be indexed as monoclinic structure with strong crystalline (110) plane. The morphological properties of the prepared films were studied by SEM. The results indicate that all films are in nano scale and the particle size around (19-62) nm .The size of silica particles increases with increasing PH value of solution where both the rate of hydrolysis and
... Show MoreAbstracts:
The Central Bank is the backbone of the banking system as a whole, and in order to maintain the banking system, one of the most important functions that the Central Bank performs is the function of supervising and controlling banks, with several tools and methods, and one of the most important of these tools is its creation of the function of a compliance observer, which obligated commercial banks to appoint a person in A bank that performs this function according to certain conditions and granting it some powers that would build a sound and compliant banking system. The function of the compliance observer is to follow up on the bank’s compliance with the instructions and decisions issued by
... Show More