Preferred Language
Articles
/
joe-1017
Chemical and Thermal Investigation on Stability of Tanuma Formation Using Different Additives with Drilling Fluids
...Show More Authors

Wellbore stability is considered as one of the most challenges during drilling wells due to the
reactivity of shale with drilling fluids. During drilling wells in North Rumaila, Tanuma shale is
represented as one of the most abnormal formations. Sloughing, caving, and cementing problems
as a result of the drilling fluid interaction with the formation are considered as the most important
problem during drilling wells. In this study, an attempt to solve this problem was done, by
improving the shale stability by adding additives to the drilling fluid. Water-based mud (WBM)
and polymer mud were used with different additives. Three concentrations 0.5, 1, 5 and 10 wt. %
for five types of additives (CaCl2, NaCl, Na2SiO3, KCl, and Flodrill PAM 1040) was used.
Different periods of immersion (1, 24 and 72 hours) were applied. The results of the immersion
test showed that using 10 wt. % of Na2SiO3 for WBM gives a high recovery percentage (77.99 %)
after 72 hr, while the result of the dispersion test (roller oven) of 10 wt % of sodium silicate with
WBM was (80.97 %) after 16 hr. Also, the immersion test result of 10 wt% of sodium silicate
with polymer mud was (79.76 %) after 72 hr and the results of dispersion test (roller oven) of 10
wt. % of sodium silicate with polymer mud was (84.51 %) after 16 hr.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Effect of leaves Extracts of Duranta repens on growth and activity of some types of Pathogenic Bacteria and Some types of Fungi
...Show More Authors

A study were conducted to examinate the effect of organic and aqueous (Hot, Cold) Extracts from leaves of Duranta repens on the growth and activities of the following types of Bacteria:- Staphylococcus aureus,Streptococcus pyogens ,Escherichia coli,Klebsilla pneumonia, in addition to the yeast Candida albicans and the fungi Aspergullis niger ,Aspergulls flavus.The result showed that gram Positive Bacteria is more sensitive to the extracts than gram negative bacteria with Minimum inhibitory concentration (MIC) value (50,25,50,100)% and Minimum Bactericidal Concentration (MBC) value (100,50,200,100)% for all types Bacteria respectively . The most active extract against A.niger ,A,flavus was cold and hot aqueous extract from the leaves with d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Using tow Methods of Pronounced and written Feed Back in Academic acquisition of students of technical medicine institute in philosophy curriculum
...Show More Authors

The world faces, in the last years of the last century and the beginning
of the current century i.e. the 21st century, a great expansion and a large
openness on new worlds in studies differ in their development, detection of
thinking methods and practice of mental processes.
The recent studies have proved an increase in the scientific
achievement among students through the presence of new techniques one of
which is Landa Organizing and Exploring Model concerning Physiology that
deals with various body organs.
This research aims at identifying the effectiveness of Landa Model on
the achievement of the Technical Medicine Institute students in Physiology so
as to be sure of the following nil hypothesis: there i

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Molecular Modeling
Ab initio study of structural, mechanical and electronic properties of 3d transitional metal carbide in cubic rocksalt (rs), zincblende (zb), and cesium chloride (cc) structures by using LDA and GGA Approximation
...Show More Authors

This study rigorously investigates three 3d transition metal carbide (TMC) structures via LDA and GGA approximations. It examines cohesive energy (Ecoh), Vickers hardness (Hv), mechanical stability, and electronic properties. Notably, most 3d TMCs exhibit higher cohesive energy than nitrides, and rs-TiC demonstrates a Vickers hardness of 25.66 GPa, outperforming its nitride counterpart. The study employs theoretical calculations to expedite research, revealing mechanical stability in CrC and MnC (GGA) and CrC (LDA in cc structure), while all 3d TMCs in rs and seven in zb structures show stability. Charge transfer and bonding analysis reveal enhanced covalency along the series, influenced by the interplay between p orbitals of carbon and d o

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref