Nanoparticles (NPs) based techniques have shown great promises in all fields of science and industry. Nanofluid-flooding, as a replacement for water-flooding, has been suggested as an applicable application for enhanced oil recovery (EOR). The subsequent presence of these NPs and its potential aggregations in the porous media; however, can dramatically intensify the complexity of subsequent CO2 storage projects in the depleted hydrocarbon reservoir. Typically, CO2 from major emitters is injected into the low-productivity oil reservoir for storage and incremental oil recovery, as the last EOR stage. In this work, An extensive serious of experiments have been conducted using a high-pressure temperature vessel to apply a wide range of CO2-pressure (0.1 to 20 MPa), temperature (23 to 70 °C), and salinity (0 to 20wt% NaCl) during CO2/water interfacial tension (IFT) measurements. Moreover, to mimic all potential scenarios several nanofluids at different and NPs load were used. IFT of CO2/nanofluid system was measured using the pendant drop method as it is convenient and flexible technique, particularly at the high-pressure and high-temperature condition. Experimentally, a nanofluid droplet is allowed to hang from one end of a dispensing needle with the presence of CO2 at the desired pressure and temperature. Regardless of the effects of CO2-pressure, temperature, and salt concentration on the IFT of the CO2/nanofluid system, NPs have shown a limited effect on IFT reduction. Remarkably, increased NPs concentration (from 0.01 to 0.05 wt%) can noticeably reduce IFT of the CO2-nanofluid system. However, no further reduction in IFT values was noticed when the NPs load was ≥ 0.05 wt%. Salinity, on the other hand, showed a dramatic impact on IFT and also on the ability of NPs to reduce IFT. Results showed that IFT increases with salinity particularly at relatively low pressures (≤ 5 MPa). Moreover, increased salinity can eliminate the effect of NPs on IFT. Interestingly, the initial NP size has no influence on the ability of NPs to reduce IFT. Consequently, the potential nanofluid-flooding processes during EOR have no negative effect on the later CO2-geosequestration projects.
Pesticides serve a crucial function in contemporary farming practices, safeguarding agricultural crops against pest infestations and boosting production outputs. However, indiscriminate use has caused environmental and human health damage. This study aimed to develop and validate a gas chromatography-flame ionization detection (GC-FID) methodology for the direct and routine analysis of spiromesifen residues in soil, leaves, and tomato fruits. The proposed method prioritizes simplicity by avoiding derivatization steps, offering advantages over existing approaches that utilize lengthy multi-step extraction or derivatization prior to GC analysis. A key novelty of this work is the development of a QuEChERS extraction coupled directly to GC-FID
... Show MoreTransition metal complexes of Co(II) and Ni(II) with azo dye 3,5-dimethyl-2-(4-nitrophenylazo)-phenol derived from 4-nitoaniline and3,5-dimethylphenol were synthesized. Characterization of these compounds has been done on the basis of elemental analysis,electronic data, FT-IR,UV-Vis and 1 HNMR, as well as magnetic susceptibility and conductivity measurements. The nature of thecomplexes formed were studies following the mole ratio and continuous variation methods, Beer ' s law obeyed over a concentrationrange (1x10 -4 - 3x10 -4 M). High molar absorbtivity of the complex solutions were observed. From the analytical data, thestoichiomerty of the complexes has been found to be 1:2 (Metal:ligand). On the basis of physicochemical data tetrahedral
... Show MoreThis study was carried out at University of Baghdad - College of Agricultural Engineering Sciences - Research Station B during the autumn season 2019-2020, in order to evaluate the effect of Ozone and the foliar application of coconut water and moringa extract on the growth of broccoli plant grown in modified NFT film technology. A factorial experiment (2*5) was carried out within Nested Design with three replicates. The ozone treatment was distributed into the main plots which consisted of oxygen (O2) and ozone (O3). The foliar application of organic nutrients were distributed randomly within each replicate including five treatments, which were the control treatment (T0), Coconut water with two concentrations of 50 (T1) and 100 ml.
... Show MoreThis study was carried out at University of Baghdad - College of Agricultural Engineering Sciences - research station B during the fall season of 2019-2020, in order to evaluate the effect of Ozone enrichment and the foliar application of organic nutrient on nutrient and water use efficiency and fertilizer productivity of broccoli plant using the modified NFT film technology. A factorial experiment (2*5) was carried out within Nested Design with three replicates. The ozone treatment was distributed into the main plots which consisted of oxygen (O2) and ozone (O3). The foliar application of organic nutrients were distributed randomly within each replicate including five treatments, which were the control treatment (T0), Coconut wat
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract
All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023