
The open hole well log data (Resistivity, Sonic, and Gamma Ray) of well X in Euphrates subzone within the Mesopotamian basin are applied to detect the total organic carbon (TOC) of Zubair Formation in the south part of Iraq. The mathematical interpretation of the logs parameters helped in detecting the TOC and source rock productivity. As well, the quantitative interpretation of the logs data leads to assigning to the organic content and source rock intervals identification. The reactions of logs in relation to the increasing of TOC can be detected through logs parameters. By this way, the TOC can be predicted with an increase in gamma-ray, sonic, neutron, and resistivity, as well as a decrease in the density log
... Show MoreModified unsaturated polyester (MUPE) was blended with Cellulose (Cls) and with ethyl cellulose (ECls) at ambient conditions in the presence of ethyl methyl ketone peroxide (EMKP) as hardener. The blends containing different weight percentages (5-25 %) of Cls or ECls. Mechanical properties (impact strength, hardness, and bending) and dielectric constant were determined. The results observed that Cls increases the impact strength, hardness, and dielectric constant and decreases the bending of the MUPS, while ECls causes an increase in the three mechanical behaviours and a decrease in the dielectric constant of the MU-PS.
The study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear
... Show MoreAbstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show MoreThe possibility of using activated carbon developed from date palm seeds wastes as a permeable reactive barrier (PRB) to remove copper from polluted shallow groundwater was investigated. The activated carbon has been developed from date palm seeds by dehydrating methods using concentrated sulfuric acid. Batch tests were performed to characterize the equilibrium sorption properties of new activated carbon in copper-containing aqueous solutions, while the sandy soil (aquifer) was assumed to be inert. Under the studied conditions, the Langmuir isotherm model gives a better fit for the sorption data of copper by activated carbon than other models. At a pilot scale, One-dimensional column experiments were performed, and an integrated model ba
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreRuthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated
... Show More