Exposure to cryogenic liquids can significantly impact the petrophysical properties of rock, affecting its density, porosity, permeability, and elastic properties. These effects can have important implications for various applications, including oil and gas production and carbon sequestration. Cryogenic liquid fracturing is a promising alternative to traditional hydraulic fracturing for exploiting unconventional oil and gas resources and geothermal energy. This technology offers several advantages over traditional hydraulic fracturing, including reduced water consumption, reduced formation damage, and a reduced risk of flow-back fluid contamination. In this study, an updated review of recent studies demonstrates how the
... Show MoreBackground: Coronavirus, which causes respiratory illness, has been a public health issue in recent decades. Because the clinical symptoms of infection are not always specific, it is difficult to expose all suspects to qualitative testing in order to confirm or rule out infection as a test. Methods: According to the scientific studies and investigations, seventy-three results of scientific articles and research were obtained using PubMed, Medline, Research gate and Google Scholar. The research keywords used were COVID-19, coronavirus, blood parameters, and saliva. Results: This review provides a report on the changes in the blood and saliva tests of those who are infected with the COVID-19.COVID-19 is a systemic infection that has
... Show MoreHigh-rise structures are a significant indication in contemporary urban improvement, mainly in areas characterized by accelerated urban growth and dense population. This type of building should be designed to withstand severe load conditions. Therefore, using composite structural elements in such structures is required for stronger and durable elements. This paper introduces a finite element analysis model for Concrete Filled Stainless Steel Tubular Columns (CFSST) of (100x100) mm cross-section and (1250) mm length to inspect the impact of concrete compressive strength on the response of (CFSST). The generated model was first evaluated through a comprehensive comparison with experimental research. Then, after the model was used to s
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More