The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.
Production logging is used to diagnose well production problems by evaluating the flow profile, entries of unwanted fluids and downhole flow regimes. Evaluating wells production performance can be easily induce from production logs through interpretation of production log data to provide velocity profile and contribution of each zone on total production. Production logging results supply information for reservoir modeling, provide data to optimize the productivity of existing wells and plan drilling and completion strategies for future wells. Production logging was carried out in a production oil well from Mishrif formation of West Qurna field, with the objective to determine the flow profile and fluid contributions from the perforations af
... Show MoreThe steady state performance of the counter rotating floating ring Journal bearing is analyzed with isothermal finite bearing theory. The effect of different parameters affecting the performance of the bearing (namely speed ratio, clearance ratio and radii ratio), have been investigated. The load carrying capacity of the bearing increasing with decreasing the radii ratio (R2/R1) of the ring and clearance ratio (c1/c2), in the other hand, the coefficient of friction increases with increasing the clearance and radii ratios, while decreases with incre4asing the bearing to journal speed ratio (γ). It is shown during this work that different operating conditions are greatly enhanced the performance
... Show MoreThis study aimed to evaluate the effectiveness of a novel concrete-encased column (CE) using small circular steel tubes filled with cementitious grouting material (GFST) as the primary reinforcement instead of traditional steel bars. The research involved three different types of reinforcement: conventional steel bars, concrete-filled steel tubes with 30% of the reinforcement ratio of steel bars, and concrete-filled steel tubes with the same reinforcement ratio as steel bars. Twenty-four circular concrete columns were tested and categorized into six groups based on the type of reinforcement employed. Each group comprised four columns, with one subjected to concentric axial load, two subjected to eccentric axial load (with eccentrici
... Show MoreThis paper deals with an up to date problem for oil and gas industry- separation of the gas -fluid fogs. Here is described the worked out physical model of the gas movement process in the sections of the inertial filtering (IF) gas separators. One can find the mathematical model for research of the fields of velocities and pressures in the inertial curvilinear channel. The main simplifications and assumptions are explained. This mathematical model has been made using mathematical program Maple and it is received the 3-d graphic of the distribution componential speed parts in the channel and also 2-d graphics at the channel sectional view when the flow is flat. The new method for gas - fluid systems separation is suggested.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More