Five subsurface sections covering the entire length of the Jeribe Limestone Formation (Early Middle Miocene) were studied from four oilfields in northern Iraq. It is hoped to unravel this formation microfacies ; depositional environment; diagenetic attributes and their parental processes; and the relationship between these processes and the observed porosity patterns. The microfacies were found to include mudstone, wackestone, packstone, and grainstone, which have been deposited respectively in open platform, restricted platform, and edge platform which represent the lagoonal environment, while the deposits of the lower parts of the Jeribe formation especially in well Hamrin- 2 reflect a deeper fore slope environment. By using the lithofacies association concepts, the depositional model of the Jeribe Formation was built. From a reservoir point of view, the formation suffered from two groups of diagenetic processes. The first one includes the porosity destructive ones such as cementation; compaction; mechanical degradation; anhydritization; and silicification. The second group include porosity enhancers ones which to include dissolution; and dolomitization.
Spectrophotometric method was developed for the determination of copper(II) ion. Synthesized (2,2[O-Tolidine-4,4-bis azo]bis[4,5-diphenyl imidazole]) (MBBAI) was used as chromogenic reagent at pH=5. Various factors affecting complex formation, such as, pH effect, reagent concentration, time effect and temperature effect, have been considered and studied. Under optimum conditions concentration ranged from (5.00-80.00) µg/mL of copper(II) obeyed Beer`s Low. Maximum absorption of the complex was 409nm with molar absorpitivity 0.127x104 L mol-1 cm-1. Limit of detection(LOD) and Limit of quantification were 1.924 and 6.42 μg/mL, respectively.
... Show MoreAs a result of rapid industrialization and population development, toxic chemicals have been introduced into water systems in recent decades. Because of its excellent efficiency and simple design, the three-dimensional (3D) electro-Fenton method has been used for the treatment of wastewater. The goal of the current study is to explore the efficiency of phenol removal by the 3D electro-Fenton process, which is one of the advanced oxidation processes (AOPs). In the present work, the effect of the addition of granular activated carbon (GAC) particles to the electro-Fenton system as the third electrode would be investigated in the presence of graphite as the anode and nickel foam as the cathode, which is the source of electro-generated hydrogen
... Show MoreCircular thin walled structures have wide range of applications. This type of structure is generally exposed to different types of loads, but one of the most important types is a buckling. In this work, the phenomena of buckling was studied by using finite element analysis. The circular thin walled structure in this study is constructed from; cylindrical thin shell strengthen by longitudinal stringers, subjected to pure bending in one plane. In addition, Taguchi method was used to identify the optimum combination set of parameters for enhancement of the critical buckling load value, as well as to investigate the most effective parameter. The parameters that have been analyzed were; cylinder shell thickness, shape of stiffeners section an
... Show MoreRestoration of degraded lands by adoption of recommended conservation management practices can rehabilitate watersheds and lead to improving soil and water quality. The objective was to evaluate the effects of grass buffers (GBs), biomass crops (BCs), grass waterways (GWWs), agroforestry buffers (ABs), landscape positions, and distance from tree base for AB treatment on soil quality compared with row crop (RC) (corn [
Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
The proposed design of neural network in this article is based on new accurate approach for training by unconstrained optimization, especially update quasi-Newton methods are perhaps the most popular general-purpose algorithms. A limited memory BFGS algorithm is presented for solving large-scale symmetric nonlinear equations, where a line search technique without derivative information is used. On each iteration, the updated approximations of Hessian matrix satisfy the quasi-Newton form, which traditionally served as the basis for quasi-Newton methods. On the basis of the quadratic model used in this article, we add a new update of quasi-Newton form. One innovative features of this form's is its ability to estimate the energy functio
... Show MoreThis study employs a critical discourse analysis approach to investigate the linguistic and discursive mechanisms employed by the prominent Russian online news platform Gazeta.ru in its coverage of social news. Drawing on an interdisciplinary framework integrating critical discourse analysis (CDA), media discourse analysis, and sociolinguistic perspectives, the research examines how language is used to construct and disseminate societal narratives. The analysis focuses on a dataset of Gazeta.ru articles published in March 2024, encompassing topics such as health, travel, and consumer affairs. Through a multi-level analytical approach, the study explores macro-level discursive strategies and microlevel linguistic choices, unveiling the intri
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreDelays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement
ABSTRUCT
The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.
A purposive non-random
... Show More