What has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).
This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreIn this paper flotation method experiments were performed to investigate the removal of lead and zinc. Various parameters such as pH, air flow rate, collector concentrations, collector type and initial metal concentrations were tested in a bubble column of 6 cm inside diameter. High recoveries of the two metals have been obtained by applying the foam flotation process, and at relatively short time 45 minutes . The results show that the best removal of lead about 95% was achieved at pH value of 8 and the best removal of zinc about 93% was achieved
at pH value of 10 by using 100 mg/l of Sodium dodecylsulfate (SDS) as a collector and 1% ethanol as a frother. The results show that the removal efficiency increased with increasing initial m
Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreEvidences indicate that human beings were preoccupied with extreme forms of mental and psychic experiences long before they were recorded in literature. Greek myths and legends appear to include symbolizations of delusions, mania, and other bizarre forms of thought and behaviuor. The figure of the mad man or woman is analogous to the wild man, or the imaginary being who appears in various forms throughout western literature and art. Various studies refer to the notion of the wild man as a response to a persistent psychological urge. This urge gives an external expression and a valid form to the impulses of reckless physical self-assertion which is believed to be hidden in all of us, but is normally kept under control. Such impulses were exp
... Show More