Preferred Language
Articles
/
O4YjdYYBIXToZYAL-YsO
Optimizing the dispersion of coal fines using Sodium Dodecyl Benzene Sulfonate
...Show More Authors

Coal fines are highly prone to be generated in all stages of Coal Seam Gas (CSG) production and development. These detached fines tend to aggregate, contributing to pore throat blockage and permeability reduction. Thus, this work explores the dispersion stability of coal fines in CSG reservoirs and proposes a new additive to be used in the formulation of the hydraulic fracturing fluid to keep the fines dispersed in the fluid. In this work, bituminous coal fines were tested in various suspensions in order to study their dispersion stability. The aggregation behavior of coal fines (dispersed phase) was analyzed in different dispersion mediums, including deionized-water, low and high sodium chloride solutions. Furthermore, the effect of Sodium Dodecyl Benzene Sulfonate (SDBS), an anionic surfactant, on fine aggregation in the suspensions was investigated over a wide alkaline range. At a known pH, the results of stability were validated with the proppant pack glass column test and further verified with microscopic images. It was observed that adding SDBS to the hydraulic fracturing fluid keeps the coal fines well-dispersed in the post-hydraulic fracturing flow back and prevents coal fines aggregation, and ultimately helps permeability enhancement. The results show that at a constant pH, as salinity increases, the zeta-potential (an indirect indicator of stability of the coal-water slurry) reduces. Also, a trace amount of SDBS substantially enhances the dispersion stability of coal fines. This enhancement dictates that coal fines will not congregate and will not plug the proppant pack. Furthermore, the results were confirmed by proppant pack glass-column tests and microscopic images, the result of which illustrate much less aggregation when having SDBS added to the suspension. Polymeric surfactants have been used in the field to disperse coal fines. However, it causes the coal matrix to swell and clog the pore throats, thus reducing the permeability. The anionic surfactant, SDBS, has never been tried in field applications to disperse coal fines. The current research demonstrates the considerable potential of SDBS, as a hydraulic fracturing fluid additive, in enhancing the dispersion stability of the coal fines.

Scopus
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Using One-Class SVM with Spam Classification
...Show More Authors

Support Vector Machine (SVM) is supervised machine learning technique which has become a popular technique for e-mail classifiers because its performance improves the accuracy of classification. The proposed method combines gain ratio (GR) which is feature selection method with one-class training SVM to increase the efficiency of the detection process and decrease the cost. The results show high accuracy up to 100% and less error rate with less number of feature to 5 features.

View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Secure Seaport Management System using Blockchain Technology
...Show More Authors

Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Plant Archives
Schistosomiasis vector control using cucumis melo plantextractswithbioassayexperiment
...Show More Authors

he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail

... Show More
View Publication
Scopus
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Temporal Video Segmentation Using Optical Flow Estimation
...Show More Authors

Shot boundary detection is the process of segmenting a video into basic units known as shots by discovering transition frames between shots. Researches have been conducted to accurately detect the shot boundaries. However, the acceleration of the shot detection process with higher accuracy needs improvement. A new method was introduced in this paper to find out the boundaries of abrupt shots in the video with high accuracy and lower computational cost. The proposed method consists of two stages. First, projection features were used to distinguish non boundary transitions and candidate transitions that may contain abrupt boundary. Only candidate transitions were conserved for next stage. Thus, the speed of shot detection was improved by r

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Copy Move Forgery Detection Using Forensic Images
...Show More Authors

     Digital images are open to several manipulations and dropped cost of compact  cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image  by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref