In this work, plasma parameters such as (electron temperature (Te), electron density (ne), plasma frequency (fp) and Debye length (λD)) were studied using spectral analysis techniques. The spectrum of the plasma was recorded with different energy values, SnO2 and ZnO anesthetized at a different ratio (X = 0.2, 0.4 and 0.6) were recorded. Spectral study of this mixing in the air. The results showed electron density and electron temperature increase in zinc oxide: tin oxide alloy targets. It was located that The intensity of the lines increases in different laser peak powers when the laser peak power increases and then decreases when the force continues to increase.
Geologic modeling is the art of constructing a structural and stratigraphic model of a reservoir from analyses and interpretations of seismic data, log data, core data, etc. [1].
A static reservoir model typically involves four main stages, these stages are Structural modeling, Stratigraphic modeling, Lithological modeling and Petrophysical modeling [2].
Ismail field is exploration structure, located in the north Iraq, about 55 km north-west of Kirkuk city, to the north-west of the Bai Hassan field, the distance between the Bai Hassan field and Ismael field is about one kilometer [3].
Tertiary period reservoir sequences (Main Limestone), which comprise many economica
... Show MoreMechanical rock properties are essential to minimize many well problems during drilling and production operations. While these properties are crucial in designing optimum mud weights during drilling operations, they are also necessary to reduce the sanding risk during production operations. This study has been conducted on the Zubair sandstone reservoir, located in the south of Iraq. The primary purpose of this study is to develop a set of empirical correlations that can be used to estimate the mechanical rock properties of sandstone reservoirs. The correlations are established using laboratory (static) measurements and well logging (dynamic) data. The results support the evidence that porosity and sonic travel time are consistent i
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreA high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat
... Show MoreDerivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with app
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
This study aims to show the effectiveness of immobilization of Chlorella green algae biomass in the form of bead for the removal of lead ions from synthetic polluted water at various operational parameters such as pH (2–6), biosorbent dosage (0.5–20 g/L) and initial concentration (10–100 mg/L). More than 90 % removal efficiency was achieved. FTIR and SEM-EDX analysis of the biosorbent before and after sorption show differences in the functional groups on the adsorbent surface. Langmuir and Freundlich equilibrium isotherm, pseudo-first-order and pseudo-second-order kinetic models were applied to the experimental and results and show good conformity with Langmuir isotherm model and pseudo-second-order kinetic model with c
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More