Shiranish formation has been divided into two microfacies units: 1 - Many biowackestone facies and 2 - maly packstone using planktonic foraminifera and other carbonate components in the rock cutting and core slides. Microfacies reflect marin deep shelf margin in the lower part of the formation, the upper part was deeper. The thickness of the formation is determined, depending on addition to the presence of echinoderm framents debris and spines. This is in disagreement with the 195 ft thickness reported by the Oil Exploration Company The age of the formation is estimated depending on the recognized biostratigraphic zone using the index fossils to be Upper - Middle Mastrichtion.
Simple, sensitive and economical spectrophotometric methods have been developed for the determination of cefixime in pure form. This method is based on the reaction of cefixime as n-electron donor with chloranil to give highly colored complex in ethanol which is absorb maximally at 550 nm. Beer's law is obeyed in the concentration ranges 5-250 µg ml-1 with high apparent molar absorptivities of 1.52×103 L.mole-1. cm-1.
Nanoparticles have gained considerable interest in recent times for oil recovery purposes owing to significant capabilities in wettability alteration of reservoir rocks. Wettability is a key factor controlling displacement efficiency and ultimate recovery of oil. The present study investigates the influence of zirconium (IV) oxide (ZrO2) and nickel (II) oxide (NiO) nanoparticles on the wetting preference of fractured (oil-wet) limestone formations. Wettability was assessed through SEM, AFM and contact angle. The potentials of the nanoparticles to alter oil-wet calcite substrates water wet, was experimentally tested at low nanoparticle concentrations (0.004–0.05 wt%). Quite similar behaviour was observed for both nanoparticles at the same
... Show MorePraise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
This research included important results, th
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreIn this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreThe reserve estimation process is continuous during the life of the field due to risk and inaccuracy that are considered an endemic problem thereby must be studied. Furthermore, the truth and properly defined hydrocarbon content can be identified just only at the field depletion. As a result, reserve estimation challenge is a function of time and available data. Reserve estimation can be divided into five types: analogy, volumetric, decline curve analysis, material balance and reservoir simulation, each of them differs from another to the kind of data required. The choice of the suitable and appropriate method relies on reservoir maturity, heterogeneity in the reservoir and data acquisition required. In this research, three types of rese
... Show More