In drilling fluid program, selecting the drilling fluid that will reduce the lost time is the first objective, and will be economical regardless of its cost. The amount and type of solids in drilling fluid is the primary control of the rheological and filtration properties. Palygorskite clay (attapulgite) is an active solid that has the ability to reactive with its environment and form a gel structure within a fluid and due to its stability in the presence of brines and electrolytes this type of clay is preferred for use. The aim of this study is to improve properties of Iraqi palygorskite (PAL) by adding different chemical additives such as caustic soda NaOH and soda ash Na2CO3 with a different concentration in both fresh and salt water-based drilling fluid to satisfy the API specification and to compete with imported palygorskite. The palygorskite claystone of Late Cretaceous age is present in the Western Desert of Iraq within the Digma Formation. In this study, two areas in Western Desert palygorskite were obtained, Bahr Al-Najaf and Trefawi. The results of rheological properties showed that the performance of Bahr Al-Najaf PAL was more affected by caustic soda than Trefawi PAL. In contrast, Trefawi PAL performance was more affected with low concentrations of soda ash than Bahr Al-Najaf PAL in both fresh and salt water-based drilling fluid. Also, these additives lead to improve the value of pH in both fresh and salt drilling fluid that increases the ability of clay to be more dispersed in drilling fluid. Besides that, enhancement of drilling fluid prepared with Iraqi palygorskite stability to 85 and 80 in fresh and saltwater, respectively, was observed with soda ash additions.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreIn this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model during di
... Show MoreContent-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add
... Show MoreSpeech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show More