Hydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil at different conditions. In addition, contact angle measurements on quartz surfaces were also conducted at similar conditions to understand the flow behavior in the porous media. Further, zeta potential and particle size distribution measurements were conducted to examine the stability of the injected nanofluids. Results revealed that the injection of nanofluids into oil-wet pore space can significantly enhance the recovery rate of hydrocarbon by altering the wettability of the porous media. However, salinity, particularly at high nanoparticles concentration (≥ 0.005) can dramatically reduce the efficiency of nanofluid. Further, increased aging time can improve the ability of nanofluid to alter the wettability of the surface, and thus more oil can be displaced. Thus, nanofluid can efficiently enhance oil recovery if correctly formulated.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreTolerance and its impact on building society
For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreUnderstanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.
The researcher tried to show the importance of obligation with the rules of professional conduct set by the Association of Accountants and Auditors of Iraqis when expressing an opinion the financial statements submitted tax administration and enhance the confidence of these lists, and adopted in the tax settling accounts process and its impact on tax revenues, and touched a researcher at the theoretical side of the search to the problem of research and of my Is there a trace of non- not to obligation by the rules of professional conduct in Iraq affect the tax revenue with the rules of professional conduct in tax revenue for companies research sample, the research aims to study the rules of professional conduct set by the Associatio
... Show More