The Quantitative high-resolution planktonic foraminiferal analysis of the subsurface section in three selected wells in the Ajeel Oil Field (Aj-8, Aj-12, and Aj-15) in Tikrit Governorate, Central Iraq has revealed that Shiranish Formation deposited in Late Campanian- Latest Maastrichtian age. This formation consists mainly of marly and marly limestone yielding diverse planktonic foraminiferal assemblages and calcareous benthic foraminifera, with a total of 46 species that belong to 23 genera, Three zones and four subzones, which cover the Late Campanian to the Latest Maastrichtian, were identified based on the recorded planktonic foraminifera and their ranges. They are as follows:1. Globotruncana aegyptiaca Zone that dated to be Lat
... Show MoreThe Mauddud Formation was one of the important and widespread Lower Cretaceous period formations in Iraq. It has been studied in three wells (EB. 55, EB. 58, and EB. 59) within the East Baghdad Oil Field, Baghdad, central Iraq. 280 thin sections were studied by microscope to determine fauna, the formation composed of limestone and dolomitized limestone in some parts which tends to be marl in some parts, forty species and genus of benthic foraminifera have been identified beside algae and other fossils, three biozones have been identified in the range which is: Orbitolina qatarica range zone (Late Albian), Orbitolina sefini range zone (Late Albian – Early Cenomanian) and Orbitolina concava range zone (Early Cenomanian), The age of
... Show MoreT he article deals with the linguistic, cultural, sociolinguistic, functional and stylistic characteristics of the translation of gluttonic discourse text structures within the framework of the Arabic-Russian combination, as well as with the difficulties encountered in interpretation and translation and related to different conditions under which speech is generated in Arabic and Russian-speaking areas.
This study was done to investigate the impact of different nanoparticles on diesel fuel characteristics, Iraqi diesel fuel was supplied from al-Dura refinery and was treated to enhance performance by improving its characteristics. Two types of nanoparticles were mixed with Iraqi diesel fuel at various weight fractions of 30, 60, 90, and 120 ppm. The diesel engine was tested and run at a constant speed of 1600 rpm to examine and evaluate the engine's performance and determine emissions. In general, ZnO additives' performance analysis showed they are more efficient for diesel fuel engines than CeO. The performance of engine diesel fuel tests showed that the weight fraction of nanoparticles at 90 and 120 ppm give a similar
... Show MoreIn this study three reactive dyes (blue B, red R and yellow Y) in single , binary and ternary solution were adsorbed by activated carbon AC in equilibrium and kinetic experiments. Surface area, Bulk and real density, and porosity were carried out for the activated carbon.
Batch Experiments of pH (2.5-8.5) and initial concentration (5-100) mg/l were carried out for single solution for each dye. Experiments of adsorbent dosage effect (0.1-1)g per 100 ml were studied as a variable to evaluate uptake% and adsorption capacity for single dyes(5, 10) ppm, binary and ternary (10) ppm of mixture solutions solution of dyes. Langmuir, and Freundlich, models were used as Equilibrium isotherm models for single solution. Extended Langmuir and Freun
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Many undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study which consists of 90 (male and female) stud
... Show More