The aim of the research is to detect the relation between the fracture sets and systems with the stages of folding. The triple junction area of the research comprises the three faced plunges of three anticlines Bekhair, Brifca and Zawita anticline. GEOreint, ver 9.5.0 was used for analyzing and classifying the data collected from the field measurements on 11 stations in proportion to the orthogonal tectonic axes. The age of exposed rocks ranges from Paleocene up to Miocene. The fractures were represented as joints, veins in addition to different types of faults. The Kinematic analysis of the fractures revealed that the stress caused the (ac) and (hko> a) fractures is coincides with the regional compression stress that form the folds where the max. Principle stress (σ1) is oriented NE-SW parallel to the tectonic axis (a) that lead to shorten the layers in perpendicular direction to the fold axis. While the extension stress was determined in the form of (hko> b) where the (σ1) oriented horizontally in NW-SE direction parallel to the tectonic axis (b) and coincides with the regional extension stress. High distribution of (hkl) in different directions during fracturing and faulting indicates the local stresses associated with more than one phase of deformation.
Joints are among the most widespread geologic structures as they are found in most each exposure of rock. They differ greatly in appearance, dimensions, and arrangement, besides they occur in quite different tectonic environments. This study is important because joints provide evidence on what kind of stress produced them (history of deformation) and also because they change the characteristics of the rocks in which they occur. The Measured data of joints from the studied area which are located in the high folded zone – Northeast of Iraq, were classified according to their relationship with the tectonic axes by projecting them stereographically using Schmidt net in GEOrient ver.9.5.0 software. The joint systems revealed the orientation of
... Show MoreThe reservoir characterization and rock typing is a significant tool in performance and prediction of the reservoirs and understanding reservoir architecture, the present work is reservoir characterization and quality Analysis of Carbonate Rock-Types, Yamama carbonate reservoir within southern Iraq has been chosen. Yamama Formation has been affected by different digenesis processes, which impacted on the reservoir quality, where high positively affected were: dissolution and fractures have been improving porosity and permeability, and destructive affected were cementation and compaction, destroyed the porosity and permeability. Depositional reservoir rock types characterization has been identified de
Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete
... Show MoreThe road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreDue to the potential cost saving and minimal temperature stratification, the energy storage based on phase-change materials (PCMs) can be a reliable approach for decoupling energy demand from immediate supply availability. However, due to their high heat resistance, these materials necessitate the introduction of enhancing additives, such as expanded surfaces and fins, to enable their deployment in more widespread thermal and energy storage applications. This study reports on how circular fins with staggered distribution and variable orientations can be employed for addressing the low thermal response rates in a PCM (Paraffin RT-35) triple-tube heat exchanger consisting of two heat-transfer fluids flow in opposites directions throug
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreThe Late Maastrichtian–Danian phosphatic succession prevails as a deposit to the west of Rutbah region, Western Iraq. This is manifested through the lithostratigraphic sections of boreholes (K.H5\6 and K.H 5\8) drilled previously in the area. The succession is mainly composed of phosphate, shale, porcelanite, oyster and foraminiferal carbonate lithofacies belonging to Digma and Akashat formations. Three facies associations are distinguished during the study: the phosclast planktonic (FA1) that dominates the outer ramp, the phosclast foraminiferal (FA2) that dominates the mid ramp, and the quartz dolomitic phosclast (FA3) present in the inner ramp. These facies’ associations are differentiated into se
... Show More