The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensifies in the presence of organic acids, with significant increases in both advancing (θa) and receding (θr) contact angles upon exposure to organic acid at 323 K and 20 MPa. Contrastingly, the application of SiO2 nanoparticles under these conditions results in a marked shift towards hydrophilicity, with θa and θr decreasing substantially, thus indicating an optimal nanoparticle concentration (0.1 wt% SiO2) for effecting the transition from H2-wet to water-wet states. This change in wettability aligns with the known pressure-dependent behavior of contact angles. Moreover, the treatment of organically-aged basalt with 0.1 wt% SiO2 nanofluids at 20 MPa and 323 K enhances the H2 column height significantly, from −424 m to 4340 m, suggesting a reduced risk of H2 migration across the caprock and thereby enhancing both the structural/residual trapping and containment security of H2 within the basaltic formations of Saudi Arabia. This article highlights the crucial role of SiO2 nanofluids in improving the efficacy of H2 storage in basalt, offering a new insight towards the optimization of geological storage solutions for hydrogen, a critical component in the transition to a sustainable energy future.
The consumption of fossil fuels has caused many challenges, including environmental and climate damage, global warming, and rising energy costs, which has prompted seeking to substitute other alternative sources. The current study explored the microwave pyrolysis of Albizia branches to assess its potential to produce all forms of fuel (solid, liquid, gas), time savings, and effective thermal heat transfer. The impact of the critical parameters on the quantity and quality of the biofuel generation, including time, power levels, biomass weight, and particle size, were investigated. The results revealed that the best bio-oil production was 76% at a power level of 450 W and 20 g of biomass. Additionally, low power levels led to enhanced
... Show MoreAbstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show Moreبسبب محدودية الموارد الطبيعية، فأن سكان الخليج ومنذ القدم وجهوا جلّ نشاطاتهم توجهاً بحرياً: صيد الاسماك وصناعة اللؤلؤ العنصر الرئيس في حجم التشغيل، وتكوين الفائض الاقتصادي في المنطقة آنذاك.
لقد تزايدت أهمية هذا النشاط بخاصة بعد النصف الثاني من القرن التاسع عشر، لرواج تجارة اللؤلؤ عالمياً، وأنفتاح الخليج على الدول الاوروبية التي شهدت نهضة صناعية متسارعة، وحيث وصلت الخليج العديد من بضائع
... Show MoreThe present study is meant to inquire about the training needs of middle stage leaders in Bisha, (Saudi Arabia) from the perspective of teachers. To achieve this purpose, the researcher has designed a questionnaire containing (31) items, distributed to a sample of (157) teacher (male and female) from the target population.
This research has demonstrated that the level of training needs for middle stage leaders was moderately reported with an arithmetic mean equivalent to (2.42), and a standard deviation of (0.36). Results have shown no significant differences at (α=0.05) in the sample’s expectations of the study’s variables.
The study concludes with a list of recommendations such as working on developing training pro
... Show MorePraise be to God alone, and prayers and peace be upon the one after whom there is no prophet, and after:
This is a regular judicial search for the issuance, validity, and cancellation of regulations in the Saudi system. It came in an introduction and four demands and a conclusion of the most important results, then a list of the most important sources and references, in which I presented: A brief study on the issuance of regulations in the Kingdom of Saudi Arabia and the stages that they pass through, their validity and application, and the rules that govern this system in terms of people, places and times, then canceling and amending regulations And its rulings, I referred to it to the original sources approved in this section,
... Show MoreThe current study aims to examine the experience of female students with disabilities who studying in university in kingdom of Saudi Arabia. To this end, the researcher used semi-structured interview as an instrument to collect the study data which regards as one of the descriptive approach tools. The sample comprised (12) disabled-female students from multidiscipline within both college of arts and college of education. To analyze the collected data, the author utilized a thematic analysis method following six steps as stated by (Braun and Clark, 2006). The findings revealed that disabled students have a high self-confidence which push them forward to take part in activities that hold on campus. Besides, significant variation were shown
... Show More