The aim of this paper is to introduce the definition of projective 3-space over Galois field GF(q), q = pm, for some prime number p and some integer m.
Also the definitions of (k,n)-arcs, complete arcs, n-secants, the index of the point and the projectively equivalent arcs are given.
Moreover some theorems about these notations are proved.
Sand production in unconsolidated reservoirs has become a cause of concern for production engineers. Issues with sand production include increased wellbore instability and surface subsidence, plugging of production liners, and potential damage to surface facilities. A field case in southeast Iraq was conducted to predict the critical drawdown pressures (CDDP) at which the well can produce without sanding. A stress and sanding onset models were developed for Zubair reservoir. The results show that sanding risk occurs when rock strength is less than 7,250 psi, and the ratio of shear modulus to the bulk compressibility is less than 0.8 1012 psi2. As the rock strength is increased, the sand free drawdown and depletion becomes larger. The CDDP
... Show MoreHeat transfer around a flat plate fin integrated with piezoelectric actuator used as oscillated fin in laminar flow has been studied experimentally utilizing thermal image camera. This study is performed
for fixed and oscillated single and triple fins. Different substrate-fin models have been tested, using fins of (35mm and 50mm) height, two sets of triple fins of (3mm and 6mm) spacing and three frequencies
applied to piezoelectric actuator (5, 30 and 50HZ). All tests are carried out for (0.5 m/s and 3m/s) in subsonic open type wind tunnel to evaluate temperature distribution, local and average Nusselt number (Nu) along the fin. It is observed, that the heat transfer enhancement with oscillation is significant compared to without o
This present paper aim at knowing the process of evaluating the training program that could be applied in Maysan Health office for it significance and importance in field of management and vocational staff preparations of high scientific experience in different fields of Health. The society of research includes staffs working in Maysan Health Office , of specialists , dentists, pharmacists, laboratories, nursing and administrators. Their number is 100 employees, the researcher has designed questionnaire by depending on "Kirkpatrick" for assessing the training . The researcher has used thorough survey and has entailed 90 questionnaire,
... Show MoreThe aim of this study is to examine the noun phrases used in Nacati Bey's divan. In this study, we have discussed all kinds of phrases including Arabic and Persian compositions. Because at that time the use of Arabic and Persian compounds was very common.
In the introduction, I briefly discussed some of Necati's life. I have benefited from valuable resources. Among these, Zeynep Korkmaz, Muharrem Ergin, Fuat Bozkurt and others.
In this study, I have dealt with the subject and type of noun phrases in detail and one by one. In this divan, Persian and Arabic noun phrases are also included. We have been mentioned and explained in this study.
The aim of this study is to propose reliable equations to estimate the in-situ concrete compressive strength from the non-destructive test. Three equations were proposed: the first equation considers the number of rebound hummer only, the second equation consider the ultrasonic pulse velocity only, and the third equation combines the number of rebound hummer and the ultrasonic pulse velocity. The proposed equations were derived from non-linear regression analysis and they were calibrated with the test results of 372 concrete specimens compiled from the literature. The performance of the proposed equations was tested by comparing their strength estimations with those of related existing equations from literature. Comparis
... Show MoreSteganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.
According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability
p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive
preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the
average durations of the preventive and corrective maintenance actions a
... Show MoreRegression analysis models are adopted by using SPSS program to predict the 28-day compressive strength as dependent variable and the accelerated compressive strength as independent variable. Three accelerated curing method was adopted, warm water (35ºC) and autogenous according to ASTM C C684-99 and the British method (55ºC) according to BS1881: Part 112:1983. The experimental concrete mix design was according to ACI 211.1. Twenty eight concrete mixes with slump rang (25-50) mm and (75-100)mm for rounded and crushed coarse aggregate with cement content (585, 512, 455, 410, 372 and 341)Kg/m3.
The experimental results showed that the acc
... Show More