Well integrity is a vital feature that should be upheld into the lifespan of the well, and one constituent of which casing, necessity to be capable to endure all the interior and outside loads. The casing, through its two basic essentials: casing design and casing depth adjustment, are fundamental to a unique wellbore that plays an important role in well integrity. Casing set depths are determined based on fracturing pressure and pore pressure in the well and can usually be obtained from well-specific information. Based on the analyzes using the improved techniques in this study, the following special proposition can be projected: The selection of the first class and materials must be done correctly and accurately in accordance with the
... Show MoreThe present search aims to develop a test for selective attention, cognitive load and thinking mistakes and measuring these concepts among Baghdad university students. To make a comparison between the selective attention, cognitive load, and the mistakes of thinking among students in term of gender. To identify the relationship among the selective attention, cognitive load and the mistakes of thinking of university students. To achieve these purposes, the searcher has developed a test for selective attention, cognitive load, and the mistakes of thinking. Then, these tools were applied to a sample of (200) university students were selected from (21) college. The researcher used t-test of one sample, t-test of two independent
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreDue to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra
... Show More<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreThis paper represents an experimentalattempt to predict the influence of CO2-MAG welding variables on the shape factors of the weld joint geometry. Theinput variables were welding arc voltage, wire feeding speed and gas flow rate to investigate their effects on the shape factorsof the weld joint geometry in terms of weld joint dimensions (bead width, reinforcement height, and penetration). Design of experiment with response surface methodology technique was employed to buildmathematical models for shape factors in terms of the input welding variables. Thepredicted models were found quadratic type and statistically checked by ANOVA analysis for adequacy purpose. Also, numerical and graphical optimizations were carried out
... Show MoreErbil city is located in the northern Iraq with a population of over one million people. Due to water crises farmers usually use wastewater and well water for the agricultural production. In this study six stations were designed to sample waste water and three from well water to define waste water and ground water characteristics. In this study, Residual Na+ Carbonate, Mg++ hazard, salinity hazard, Kelley index, %sodium, total hardness, permeability index, potential salinity, sodium adsorption ratio, and Irrigation Water Quality Index (IWQI) were determined. The order of average cation concentrations in water was Mg2+> Ca2+ > Na+ > K+. While the proportion of main
... Show MoreObjective(s): This study aims to assess health related quality of life among Iraqi patients with chronic viral hepatitis
B and C also to find out the relationship between health related quality of life and patients demographic
characteristic and to design a new measurement scale for assessing QoL among viral hepatitis B and C patients
which can be suitable to be adopted for Iraqi patients
Methodology: A descriptive quantitative study is carried out at Gastroenterology and Hepatology Teaching
Hospital from February, 1st, 2011 to August 30th 2011, Anon probability (purposive sample) of (100) chronic viral
hepatitis B and C persons , who were clients of Gastroenterology and Hepatology Teaching Hospital / outpatient
clin
The present study aims at analyzing the polysemy of the English preposition in from the cognitive linguistic (CL) point of view using Evans' and Tyler's approach (2003). The perplexity faced by Iraqi second language learners (L2) due to the multi-usages of this preposition has motivated the researcher to conduct this study. Seventy-six second year university students participated in this experimental study. The data of the pre-test and post-test were analyzed by SPSS statistical editor. The results have shown the following: First, a progress of more than (0.05≤) has been detected as far as students' understanding of the multiple usages of the preposition in is concerned. Second, the results of the questionnaire have s
... Show More