The aim of this work is to produce samples from Iraqi raw materials like Husyniat Bauxite (raw and burnt) and to study the effect of some additives like white Doekhla kaolin clays and alumina on that material properties were using sodium silica as a binding material. Five mixtures were prepared from Bauxite (raw and burnt) and kaolin clays, with an additive of (40) ml from sodium silica and alumina of (2.5, 5, 7.5,10 wt %) percentage as a binding material. the size grading was through sieving. The formation of all specimens was conducted by a measured gradually semi-dry pressing method under a compression force of (10) Tons and humidity ratio ranging from (5-10) % from mixture weight. Drying all specimens was done and then they were burn
... Show MoreNanofluids are proven to be efficient agents for wettability alteration in subsurface applications including enhanced oil recovery (EOR). Nanofluids can also be used for CO2-storage applications where the CO2-wet rocks can be rendered strongly water-wet, however no attention has been given to this aspect in the past. Thus in this work we presents contact angle (θ) measurements for CO2/brine/calcite system as function of pressure (0.1 MPa, 5 MPa, 10 MPa, 15 MPa, and 20 MPa), temperature (23 °C, 50 °C and 70 °C), and salinity (0, 5, 10, 15, and 20% NaCl) before and after nano-treatment to address the wettability alteration efficiency. Moreover, the effect of treatment pressure and temperature, treatment fluid concentration (SiO2 wt%) and
... Show MoreHypothesis CO2 geological storage (CGS) involves different mechanisms which can store millions of tonnes of CO2 per year in depleted hydrocarbon reservoirs and deep saline aquifers. But their storage capacity is influenced by the presence of different carboxylic compounds in the reservoir. These molecules strongly affect the water wetness of the rock, which has a dramatic impact on storage capacities and containment security. However, precise understanding of how these carboxylic acids influence the rock’s CO2-wettability is lacking. Experiments We thus systematically analysed these relationships as a function of pressure, temperature, storage depth and organic acid concentrations. A particular focus was on identifying organic acid conce
... Show MoreUse of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show MoreBackground: Health information systems in most countries are inadequate in providing the needed management support and the current health information systems are therefore widely seen as management obstacles rather than as tools,Objectives: the current study is an attempt to assess the behavioral and organizational determinants of health information system performance in Iraq.Methods: A cross-sectional study was conducted by interviewed a total of 189 respondents selected from six Iraqi governorates. The Organizational and Behavioral Assessment Tool was used to measure the behavioral and organizational determinants of health information system performance, it is one of the PRISM package tools that are used to assess the health informatio
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreThis study presents certain modifications done to the conditions set by Searle
(1969: 57) concerning the speech act of promising in order to render them to selected
sayings of Prophet Muhammad (P.B.U.H.) and Jesus Christ (P.B.U.H.) and to
political texts. These modifications make the conditions of the speech act of
promising appropriate for sincere promises made by the Messengers of God since
they deliver their Messages of God but they are unable, as Messengers, to fulfill
God’s promises which they make as part of their Messages and by representatives of
States who deliver speeches on behalf of their Governments. These are the only two
situations where the speakers can make promises and do not fulfill these prom
In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha
... Show More