Drilling fluid properties and formulation play a fundamental role in drilling operations. The Classical water-based muds prepared from only the Syrian clay and water without any additives((Organic and industrial polymers) are generally poor in performance. Moreover, The high quantity of Syrian clay (120 gr / l) used in preparing drilling fluids. It leads to a decrease in the drilling speed and thus an increase in the time required to complete the drilling of the well. As a result, the total cost of drilling the well increased, as a result of an increase in the concentration of the solid part in the drilling fluid. In this context, our study focuses on the investigation of the improvement in drilling mud Prepared from the Syrian clay by reducing the clay concentration to (50 gr / L). And compensate for the remaining amount (70 gr / l) of clay by adding (natural and industrial polymers) The rheological properties and filtration are measured at different concentrations of polymers .. In light of the experiments, we determine the polymers' concentrations that gave good results in improving the flow properties and controlling the Filter. It is polymers that have given good results:، HEC، HEC and Xanthan Gum PAC and HEC، CMCHV، PolyAcryl Amid ، Xanthan Gum .
The event of crossing the barriers is one of the Power Games activities that have received great attention in the field of researches. Which led to ma..
Land use change, particularly the expansion of urban areas and associated human activities at the expense of natural and semi-natural areas, is a major ecological issue in urban areas around the world. Climate change being a very strong additional driver for changing the temperature and habitat in the cities. This also applies to Baghdad, Iraq, where urbanisation and climate change exerts a major pressure on the natural habitats of the city, and thus may affect the ability of city planners to adapt to future climate change scenarios. Here we present evidence of substantial growth in urban areas, increases in temperature, and degradation of natural vegetation within Baghdad city by using Remote Sensing techniques and an assessment for the
... Show MoreThe Boltzmann equation has been solved using (EEDF) package for a pure sulfur hexafluoride (SF6) gas and its mixtures with buffer Helium (He) gas to study the electron energy distribution function EEDF and then the corresponding transport coefficients for various ratios of SF6 and the mixtures. The calculations are graphically represented and discussed for the sake of comparison between the various mixtures. It is found that the various SF6 – He content mixtures have a considerable effect on EEDF and the transport coefficients of the mixtures
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreMedian filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett
... Show MoreHemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to
... Show MoreThis paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.
This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More