The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensifies in the presence of organic acids, with significant increases in both advancing (θa) and receding (θr) contact angles upon exposure to organic acid at 323 K and 20 MPa. Contrastingly, the application of SiO2 nanoparticles under these conditions results in a marked shift towards hydrophilicity, with θa and θr decreasing substantially, thus indicating an optimal nanoparticle concentration (0.1 wt% SiO2) for effecting the transition from H2-wet to water-wet states. This change in wettability aligns with the known pressure-dependent behavior of contact angles. Moreover, the treatment of organically-aged basalt with 0.1 wt% SiO2 nanofluids at 20 MPa and 323 K enhances the H2 column height significantly, from −424 m to 4340 m, suggesting a reduced risk of H2 migration across the caprock and thereby enhancing both the structural/residual trapping and containment security of H2 within the basaltic formations of Saudi Arabia. This article highlights the crucial role of SiO2 nanofluids in improving the efficacy of H2 storage in basalt, offering a new insight towards the optimization of geological storage solutions for hydrogen, a critical component in the transition to a sustainable energy future.
Due to the potential cost saving and minimal temperature stratification, the energy storage based on phase-change materials (PCMs) can be a reliable approach for decoupling energy demand from immediate supply availability. However, due to their high heat resistance, these materials necessitate the introduction of enhancing additives, such as expanded surfaces and fins, to enable their deployment in more widespread thermal and energy storage applications. This study reports on how circular fins with staggered distribution and variable orientations can be employed for addressing the low thermal response rates in a PCM (Paraffin RT-35) triple-tube heat exchanger consisting of two heat-transfer fluids flow in opposites directions throug
... Show MoreBaghdad (the capital of the Abbasid Caliphate, and his legacy oldest civilizations in history, with glory ethyl). 1. benediction this city landmarks archaeological evidence of their own Kkabbab mosques and forms gates and (Aelchenachel) 2, which adorn the walls of buildings and Chaababeckha high and palm trees, all these vocabulary inspired artists embody Baghdad warmest dissolved in their artwork and all those who lived and grew up in Baghdad embodied in his memory for the nights Beauties and their lights and Hoa_khasha. Ceramic Arts art one who embodied the most important symbols that represent the beauty and credited with Baghdad. And many Iraqis potters inspired single Baghdadi in their work, notably ceramists late arrows Saudi which
... Show MoreThe concept of social graphic design is one of the most critical areas that highlight the designer's knowledge of social responsibility by employing design skills in community awareness. This study focused on defining social graphic design, the meaning, practices, and strategies for designing awareness posters. This study reviewed two examples of awareness posters that reflect the Saudi designer's practices. The results summarized that social graphic design is a concept not taught directly but gained from permanent practice in designing awareness posters that interact with community issues. The designer's understanding of his social events and their sensing in the visual form of a poster reflects the designer's social awareness. Social g
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.