Preferred Language
Articles
/
-Bf_PpIBVTCNdQwCsKhd
Nanofluid-assisted enhanced sealing security for efficient geological hydrogen storage in Saudi Arabian basalt
...Show More Authors

The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensifies in the presence of organic acids, with significant increases in both advancing (θa) and receding (θr) contact angles upon exposure to organic acid at 323 K and 20 MPa. Contrastingly, the application of SiO2 nanoparticles under these conditions results in a marked shift towards hydrophilicity, with θa and θr decreasing substantially, thus indicating an optimal nanoparticle concentration (0.1 wt% SiO2) for effecting the transition from H2-wet to water-wet states. This change in wettability aligns with the known pressure-dependent behavior of contact angles. Moreover, the treatment of organically-aged basalt with 0.1 wt% SiO2 nanofluids at 20 MPa and 323 K enhances the H2 column height significantly, from −424 m to 4340 m, suggesting a reduced risk of H2 migration across the caprock and thereby enhancing both the structural/residual trapping and containment security of H2 within the basaltic formations of Saudi Arabia. This article highlights the crucial role of SiO2 nanofluids in improving the efficacy of H2 storage in basalt, offering a new insight towards the optimization of geological storage solutions for hydrogen, a critical component in the transition to a sustainable energy future.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
nternational will in the Security Council Towards the Syrian crisis
...Show More Authors

Nations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to wor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Effect of a Training Program in Introducing Saudi Traditional Fashion in Local Museums
...Show More Authors

Museum education is of great importance to an appropriate representation of museums’ collections and exhibits, including traditional fashion. Therefore, museum educators/curators need to be equipped with the most essential skills in their profession in order to adequately present the museum’s history and holdings. This could be achieved through specialized training programs. However, Arab countries are still behind in terms of museum education. Therefore, this article aims to shed light on this issue by assessing the knowledge and skills possessed by museum educators/curators and how training programs could affect them

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Intelligent Systems
An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
...Show More Authors
Abstract<p>With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to provide medical services in emergency cases. Despite the high technologies associated with medical tracks and advanced traffic management systems, there is still a current delay in ambulances’ attendance in times of emergency to provide patients with vital aid. Therefore, it is indispensable to introduce a new emergency service system that enables the ambulance to reach the patient in the least congested and shortest paths. However, designing an effici</p> ... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 07 2018
Journal Name
Asian Journal Of Pharmaceutical And Clinical Research
HYDROGEN PEROXIDE LEVELS CORRELATE WITH SUPEROXIDE DISMUTASE IN IRAQI WOMEN WITH PREGNANCY-INDUCED HYPERTENSION
...Show More Authors

Objective: Pregnancy-induced hypertension (PIH) is a major pregnancy complication that leads to maternal mortality. Here, we have scrutinized the correlation between serum levels of hydrogen peroxide (H2O2) and superoxide dismutase (SOD) in PIH.Methods: Serum samples were collected from 80 Iraqi women (40 women with PIH as patients group, 20 normotensive pregnant women as a positive control, and 20 normotensive non-pregnant women as a negative control) all groups were diagnosed clinically.Results: Serum of H2O2 and SOD levels was measured for all studied groups. Results showed that there were no significant variances in age and gestational age distribution between all studied groups. Furthermore, result showed that the serum level o

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref