Tanuma and Zubair formations are known as the most problematic intervals in Zubair Oilfield, and they cause wellbore instability due to possible shale-fluid interaction. It causes a vast loss of time dealing with various downhole problems (e.g., stuck pipe) which leads to an increase in overall well cost for the consequences (e.g., fishing and sidetrack). This paper aims to test shale samples with various laboratory tests for shale evaluation and drilling muds development. Shale's physical properties are described by using a stereomicroscope and the structures are observed with Scanning Electron Microscope. The shale reactivity and behavior are analyzed by using the cation exchange capacity testing and the capillary suction test is utilized for selecting shale inhibitor base. As a result, four drillings muds are formulated with different additives and approved by using the Linear Swelling Meter and the Hot Rolling experiments. Tanuma’s shale is at higher reactivity level, where it is moderate to high active shale than Zubair’s shale, which is at a low to moderately reactive formation. Microfractures and micropores are excited in both formations and potentially in Tanuma’s shale. The shale stability can be achieved by adding 8 % of KCl for Tanuma’s mud and 4% of KCl for Zubair’s mud. The filtration controls are contributed to seal the shale open structures and adding the Poly amino acid hydration suppressant reduced the risk of shale swelling significantly. The results can be used for designing drilling mud to reduce shale instability issues and the cost.
Adaptive responses in larval behavior may be of two kinds: Taxis: This involves a change in direction relative to source of a stimulus. Kinesis: Kinesis has no directional component, but involves change in the rate of performance in response to a stimulus. Drosophila larvae exhibited flexible behavioral responses associated with food acquisition and selection for different environmental conditions. In this investigation, we are concerned explosively with kinetic responses to food viability. Third instar larvae were subjected to test for thirty minutes in each of the following conditions i) in distilled water, ii) in Ringer's solution, iii) in glucose solution and on live yeast suspension. In each case the larva was in a thin layer of solu
... Show MoreFive levels of Zn-EDTA fertilizer and foliar application of boron were used to study the local rice response through studying of some vegetative and reproductive growth characters, by conducting two field experiments at Kanipanka Agricultural Research Station during the summer season of 2004 by using RCBD with three replications. Significant differences were found in studied characters, there were increase in the number of days from seeding to 50% flowering (94.330-96.233) days, from 50% flowering to physiological maturity (37.50-38.28) days, plant height (82.50-91.423) cm and LAI (5.441-7.525). Reproductive characters such as number of grains panicle-1 (74.11-85.88), number of panicles m-2 (321.00-426.083), biological yield (8166.166-11082
... Show MoreThe influence of silver doped n-type polycrystalline CdTe film with thickness of 200 nm and rate deposition of 0.3 nm.s -1 prepared under high vacuum using thermal co-evaporation technique on its some structural and electrical properties was reported. The X- ray analysis showed that all samples are polycrystalline and have the cubic zinc blend structure with preferential orientation in the [111] direction. Films doping with impurity percentages (2, 3, and 4) %Ag lead to a significant increase in the carrier concentration, so it is found to change from 23.493 108 cm -3 to 59.297 108 cm -3 for pure and doped CdTe thin films with 4%Ag respectively. But films doping with impurity percentages above lead to a significant decrease in the electrica
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More