Tanuma and Zubair formations are known as the most problematic intervals in Zubair Oilfield, and they cause wellbore instability due to possible shale-fluid interaction. It causes a vast loss of time dealing with various downhole problems (e.g., stuck pipe) which leads to an increase in overall well cost for the consequences (e.g., fishing and sidetrack). This paper aims to test shale samples with various laboratory tests for shale evaluation and drilling muds development. Shale's physical properties are described by using a stereomicroscope and the structures are observed with Scanning Electron Microscope. The shale reactivity and behavior are analyzed by using the cation exchange capacity testing and the capillary suction test is utilized for selecting shale inhibitor base. As a result, four drillings muds are formulated with different additives and approved by using the Linear Swelling Meter and the Hot Rolling experiments. Tanuma’s shale is at higher reactivity level, where it is moderate to high active shale than Zubair’s shale, which is at a low to moderately reactive formation. Microfractures and micropores are excited in both formations and potentially in Tanuma’s shale. The shale stability can be achieved by adding 8 % of KCl for Tanuma’s mud and 4% of KCl for Zubair’s mud. The filtration controls are contributed to seal the shale open structures and adding the Poly amino acid hydration suppressant reduced the risk of shale swelling significantly. The results can be used for designing drilling mud to reduce shale instability issues and the cost.
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe current study aimed to identify the difficulties faced by the student in mathematics and possible proposals to address these difficulties. The study used a descriptive method also used the questionnaire to collect data and information were applied to a sample of (163) male and female teachers. The results of the study found that the degree of difficulties in learning mathematics for the fifth and sixth grades is high for some paragraphs and intermediate for other paragraphs, included the student's field. The results also revealed that there were no statistically significant differences at the level of significance (α = 0.05) between the responses of the members of the study sample from male and female teachers to the degree of diffi
... Show MoreA field experiment was carried out in the fields of the Field Crops Department - Faculty of Agricultural Engineering Sciences. The study included five inbred lines (ZM43W (ZE), ZM60, ZM49W3E, ZM19, CDCN5), given numbers 1, 2, 3, 4 and 5) to study the hybrid vigor and both general and special combing ability (GCA, SCA) of the half diallel mating method, for the spring and fall seasons (2016). The genetic analysis shows that all crosses gave a positive hybrid vigor for grain yield per unit area at the two population densities. the highest value is 116.20% for cross (3´5 )at low density, and 89.22% for cross( 1´4 )at high density. The hybrid vigor for all crosses is positive at two densities for dry matter yield, crop growth rate an
... Show MoreWe have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD) to estimate the parameters an
... Show MoreIn this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreThe current research tackles the self-efficacy and its relation to the cognitive assessment for the daily disturbances for the University of Baghdad students. Two criteria have been adopted to achieve the objectives of the research. The sample of this study consists of 200 male and female students who were chosen randomly. The data were analyzed statistically, revealing that the university students owned their own self-efficacy as well as a cognitive assessment for the daily disturbances and they recognized them as self-threatening. The results also indicated the existence of a prediction activity in the field of the cognitive assessment to the daily disturbances selection. In light of the acquired results, the study recommends the neces
... Show MoreIn this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients
... Show MoreAir pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant
The present work presents design and implementation of an automated two-axis solar tracking system using local materials with minimum cost, light weight and reliable structure. The tracking system consists of two parts, mechanical units (fixed and moving parts) and control units (four LDR sensors and Arduino UNO microcontroller to control two DC servomotors). The tracking system was fitted and assembled together with a parabolic trough solar concentrator (PTSC) system to move it according to information come from the sensors so as to keep the PTSC always perpendicular to sun rays. The experimental tests have been done on the PTSC system to investigate its thermal performance in two cases, with tracking system (case 1) and without trackin
... Show More