Predicting vertical stress was indeed useful for controlling geomechanical issues since it allowed for the computation of pore pressure for the formation and the classification of fault regimes. This study provides an in-depth observation of vertical stress prediction utilizing numerous approaches using the Techlog 2015 software. Gardner's method results in incorrect vertical stress values with a problem that this method doesn't start from the surface and instead relies only on sound log data. Whereas the Amoco, Wendt non-acoustic, Traugott, average technique simply needed density log as input and used a straight line as the observed density, this was incorrect for vertical computing stress. The results of these methods
... Show MoreOptimum allocation of water for restoration of Iraqi marshes is essential for different related authorities. Abo-Ziriq marsh area about 120 km2 is situated 40 km east of Al-Nassryia city. After comparing the measured annual water qualities with the Iraqi standards for surface water quality evaluation, Abo-Ziriq marsh water quality was in acceptable limit. Hydro balance computation were done for each month by using interface among the HEC-RAS, HEC-GeoRAS and ArcView GIS software and built a number of eco-hydro relationships to simulate the marsh ecosystem by using HEC-EFM program to estimate water allocation adequate for ecosystem requirement and constructs a GIS hydraulic reference map to show inundation area, depth grid and velocity dis
... Show MoreIn this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Polymer films of PEG and PVA and their blend with different
concentrations of MnCl2 (0, 2, 4, 6 and 10 %.wt) were study using
casting technique. The X-ray spectra of pure PEG, PVA and
PVA:PEG films and with addition of 2% concentrations from
(MnCl2) show amorphous structures. The results for FTIR show the
interaction between the filler and polymer blend results in
decreasing crystallinity with rich amorphous phase. This
amorphous nature confirms the complexation between the filler and
the polymer blend. The optical properties of (PVA:PEG/MnCl2)
contain the recording of absorbance (A) and explain that the
absorption coefficient (α), refractive index (n), extinction coefficient
(ko) and the dielectric cons
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.