Preferred Language
Articles
/
joe-1026
The Effect of Nano Materials on Lost Circulation Control of Azkand Formation in Khabaz Oil Field
...Show More Authors

Experimental tests were carried to control lost circulation in the Khabaz oil field using different types of LCMs including Nano-materials. A closed-loop circulation system was built to simulate the process of lost circulation into formations. Two dolomite plugs were used from different depths of the formation of Azkand in Khabaz oil field. The experimentations were carried out to study the effect of different types of LCMs, cross-linked copolymer (FLOSORB CE 300 S), SiO2 NP, and Fe2O3 NP, on mud volume losses as a function of time.

The rheological measurements of the nanoparticles-reference mud system showed that both of the SiO2 NP and Fe2O3 NP worked best at 1.2 g/l. and the closed-loop circulation system showed that SiO2 NP cured losses by 48.3% and 37.5% for core plugs 5C1 and 1C2 respectively which is better than Fe2O3 NP loss curing which was 37.9% and 31.3% for core plugs 5C1 and 1C2 respectively.

On the other hand, FLOSORB CE 300 S- Fe2O3 NP-reference mud systems cured losses up to 69% with 0.25g/l FLOSORB CE 300 S and 79.3% with 0.5 g/l FLOSORB CE 300 S which is better than the FLOSORB CE 300 S- SiO2 NP-reference mud systems results.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
THE MEENTAL FACTS CONCEPTS IN THE (1408) FILM: حيدر صبري جعفر
...Show More Authors

The location element indispensable in the film, it is the container that meets the all the elements of the artwork, and place in the cinema topic or space as the existence of a material perceptible senses, is one of the key elements in the drama because he is one of the conditions to achieve supply drama which, with the nature of the vehicle because it is linked to reality the real and the reality of mental imagined, and returns the importance of the place mentally to change the pattern in the building's traditional place in the world of the film, is that the space under the facts of the events imagined or mental and determined by the processors directorial, and where mental in the movies but found himself a world with a pace sometimes s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Scientific values in the chemistry curriculum For the sixth grade scientific
...Show More Authors

The goal of current research to know the according of scientific values in the curriculum of chemistry sixth - grade science To achieve this goal wasa to build aalistaofa scientifica values toa be included in the curriculum of chemistry sixth - grade science after seeing a group of literature and previous studies, the list presented to a group of arbitrators and specialists in educational and psychological sciences and methods of teaching science, and curricula and teaching methods , Arbitrators and specialists have expressed their views and comments on the tool, and that the list was formed in final form (9) values Head of scientific includes ( 35) sub - value, then the researcher analyzed the chemistry curriculum for sixth grade Scient

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction
Identify the Critical Risk Factors at the Tendering Phase in Iraq
...Show More Authors

Risk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Capability of The Iraqi Banking Sector of Commitment to Implementing the Act: (FATCA)Through The Specialized Computerized Program
...Show More Authors

The Foreign Account Tax Compliance Act (FATCA) basically targets US citizens’ accounts hold at foreign banks and financial institutions blush, seems and non-financial sector by the Act:( retirement plan companies, investment funds, hedge funds and family investment companies.)

The non Compliance of Foreign of financial institutions act will lead to financial looses and harm regarding reputation, especially for the countries that rely on foreign relations in their financial and banking activities, in addition to deducting 30 % of their total incomes and sales coming from the USA. These institutions can avoid it by entering into agreement with the Internal Revenue Service's to be foreign financial institutions complied with the a

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Analyzing the content of the chemistry textbook for the third intermediate grade according to the skills of knowledge economy
...Show More Authors

The current research aims to identify the extent to which cognitive economics skills are included in the content of the chemistry textbook for the third intermediate grade, and the research sample was represented in the chemistry textbook for the third intermediate grade. A list of knowledge economy skills was prepared (6) main skills (basic skills, communication skills, thinking skills, work skills Group, information-gathering skill, behavioral skills (and (20) sub-skills) (reading, writing, operations, computer skills and employability, oral expression and written communication, dialogue, persuasion, influence and arousal, analysis, problem-solving, decision-making, suggestions and hypotheses and employing them. Controlling, directing

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Linguistic Characteristics In The Morphology ( Nominal Suffixes ) Of a Number Of ( Khoryat or Hoyrat ) Printed By The Poet Kamal Mustafa Daquqli: Kemal Mustafa Dakuk ̕ lunun Basılmayan Bazı Hoyratlarında Şekil Bilgisi Özelliklerin ( İsim Durum Ekleri )
...Show More Authors

The present study, entitled “ linguistic characteristics (the morphology - nominal suffixes ) of a number of (Quriyat or koyrat ) by the poet Kamal Mustafa Daquqli, aims at studying and making a comparison between  Turkmen dialect written and spoken forms that show many of the hidden language structures. Similarly, the study sheds light on the poet as one of the most prominent literary figures in Turkmenistan literature.

Turkman Quriyat is one of Turkman blank verse significant forms. Apart from (songs and Quriyat) and until the 19th C., folk poetry has been stalled for a long time but reclaimed its literary high position in the middle of the 20th C.

The study introduction briefly discusses Tu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
IoT System on Dynamic Fish Feeder Based on Fish Existence for Agriculture Aquaponic Breeders
...Show More Authors

Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed May 09 2012
Journal Name
Fuzzy Inference System - Theory And Applications
Some Studies on Noise and Its Effects on Industrial/Cognitive Task Performance and Modeling
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication