Hydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil at different conditions. In addition, contact angle measurements on quartz surfaces were also conducted at similar conditions to understand the flow behavior in the porous media. Further, zeta potential and particle size distribution measurements were conducted to examine the stability of the injected nanofluids. Results revealed that the injection of nanofluids into oil-wet pore space can significantly enhance the recovery rate of hydrocarbon by altering the wettability of the porous media. However, salinity, particularly at high nanoparticles concentration (≥ 0.005) can dramatically reduce the efficiency of nanofluid. Further, increased aging time can improve the ability of nanofluid to alter the wettability of the surface, and thus more oil can be displaced. Thus, nanofluid can efficiently enhance oil recovery if correctly formulated.
A time series analysis can help to observe the behavior of the system and specify the system faults. In addition, it also helps to explain the various energy flows in the system and further aid in reducing the thermodynamic losses. The intelligent supervisory LabVIEW software can monitor the incoming data from the system by using Arduino microcontroller and calculates the important parameters. Energy, exergy, and anergy analysis present in this paper to investigate the system performance as well as its components. To accomplish this, a 4-ton vertical split air conditioner based on vapor compression refrigeration cycle charged with refrigerant R-22 was modified for experimental analysis. The results showed that during 540
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreAcinetobacter baumannii received attention for its multi-drug resistant associated with many severe infections and outbreaks in clinical environment. The aims of the study are to investigate the antibiotic susceptibility profile of clinically isolated A. baumannii, biofilm production, and the efficiency of Low Frequency Ultrasound (LFU) and honey to attenuate biofilm production. A total of 100 samples were taken from different sources from Baghdad hospitals. The susceptibility patterns revealed the percentage of pan drug resistant (PDR) isolates were 1.5 %, 72.7 % were extended drug resistant (XDR), 16.7 % were multidrug resistant (MDR), and 9.1 % were non MDR and sensitive to most antibiotics used. The ability to form
... Show MoreIn this research, the influence of the fermentation treatments and baking in Iraqi’s flour type (Ibaa 99, Al-rashed, Tamus, Abu-grabe) and Turkish flour type (Muaamel) on phytic acid was investigated. In whole wheat flour, the phytic acid was (1500, 1290, 1450, 1230, 1440 ( mg/ 100 g flour respectively, and the inorganic phosphorous was (29.18, 25.15, 23.89, 20.85, 22.83) mg/100 g flour respectively. The dough prepared from flour with a higher phytic acid content also contained higher amount of phytic acid. During fermentation, degradation of phytic acid occurred. The cumulative loss of phytic acid after fermentation in all type of dough was ~ 23, 22, 34, 26 and 27% respectively،While increased of inorganic phosphorous occurred. The c
... Show MoreAbstract
The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level of (0.05) between the average score of students of the experimental group who study the history of Europe and modern American history according to the model of Addie and Shayer, and the average scores of the students of the control group who study the same subjects according to the traditional method in the test of post-achievement. 2) There was no statistically significant difference at the level (
... Show MoreThis study is a complementary one to an extended series of research work that aims to produce a thermodynamiclly stable asphalt –sulfur blend. Asphalt was physically modified wiht different percentages of asphaltenes , oxidized asphaltenes and then mixed with sulfur as an attempt to obtaine a stable compatible asphalt-sulfur blend. The homogeneneity of asphalt-asphaltenes[oxidized asphaltenes]-sulfur blends were studied microscopically and the results are prsented as photomicrographs. Generally more stable and compatible asphalt-sulfur blends were obtained by this treatment.
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.