The important parameter used for determining the probable application of miscible displacement is the MMP (minimum miscibility pressure). In enhanced oil recovery, the injection of hydrocarbon gases can be a highly efficient method to improve the productivity of the well especially if miscibility developed through the displacement process. There are a lot of experiments for measuring the value of the miscibility pressure, but they are expensive and take a lot of time, so it's better to use the mathematical equations because of it inexpensive and fast. This study focused on calculating MMP required to inject hydrocarbon gases into two reservoirs namely Sadi and Tanomaa/ East Baghdad field. Modified Peng Robenson Equation of State was used to estimate MMP values for the two samples. The parameters of this equation have been tuned by splitting the plus component and regression process to obtain the best match for PVT properties between the calculated and that measured in the laboratory. Then the MMPs value compared with the results most reliable correlation. Ternary diagram for these samples has been constructed to illustrate the occurrence of miscibility.
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreThe paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreAbstract
Locally natural occurring Iraqi rocks of Bauxite and Porcelanite (after pre calcinations at 1000oC for 1hr) were used, with the addition of different proportions of MgO and Al2O3, to prepare refractory materials. The effects of these additives on the physical and thermal properties of the prepared refractories were investigated.
Many batches of Bauxite/MgO, Bauxite/Al2O3, Bauxite/MgO/Al2O3, and Porcelanite/ MgO/Al2O3 were prepared. The mixture is milled and classified into different size fractions; fine (less than 45μm) 40%, middle (45-75μm) 40%, and coarse (75-106μm) 20% .
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreThe second leading cause of death and one of the most common causes of disability in the world is stroke. Researchers have found that brain–computer interface (BCI) techniques can result in better stroke patient rehabilitation. This study used the proposed motor imagery (MI) framework to analyze the electroencephalogram (EEG) dataset from eight subjects in order to enhance the MI-based BCI systems for stroke patients. The preprocessing portion of the framework comprises the use of conventional filters and the independent component analysis (ICA) denoising approach. Fractal dimension (FD) and Hurst exponent (Hur) were then calculated as complexity features, and Tsallis entropy (TsEn) and dispersion entropy (DispEn) were assessed as
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreThe current research seeks to identify the most important humanitarian issues of a sacred and very important group in all the heavenly religions and human societies, namely the elderly, to identify their significant problems and health problems, and What are the effects of these problems on their mental health and which is the ultimate goal of human resources in All parts of the world? The study relied on what is available from the sources in the literature starting from the messages of heaven and the Islamic religion followed with humanitarian, social, legal and psychological postulates. The research included four systematic chapters included the definition research and identification of the problem, importance, objectives and terminolo
... Show More