Preferred Language
Articles
/
ijcpe-210
Using Different Surfactants to Increase Oil Recovery of Rumaila Field (Experimental Work)
...Show More Authors

Enhanced oil recovery is used in many mature oil reservoirs to increase the oil recovery factor. Surfactant flooding has recently gained interest again. To create micro emulsions at the interface between crude oil and water, surfactant flooding is the injection of surfactants (and co-surfactants) into the reservoir, thus achieving very low interfacial tension, which consequently assists mobilize the trapped oil.

In this study a flooding system, which has been  manufactured and described at high pressure. The flooding processes included oil, water and surfactants. 15 core holders has been prepared at first stage of the experiment and  filled with washed sand grains 80-500 mm and then packing the sand to obtain sand packs samples for experiment. It was found that the best rate for water injection was 1.2 PV. Productively, while the optimum injection rate was 1.0 PV economically.

The study observed that the cost of water injection in secondary recovery increased 700% when PV injected increased from 1.0 PV to 8.0 PV, while the recovery increased only about 8% (58.77 – 66.7%).

The effects of  concentration, salinity and temperature is also explored by examined many values of each parameter according to surface tension by using capillary rise method. It was found that the optimum conditions for surfactant flooding for sodium dodecyl sulfate (SDS) 0.01 molar for concentration, 5500 P.P.M for salinity and 70 °C for temperatures. These conditions was used  to all kinds of surfactants that have been used in this study.

The study results indicated that the best surfactant in both productively and economically was SDS with maximum recovery about 90% for each secondary and tertiary recovery and the optimum injection volume for all surfactants 1.2 PV .

Another 12 Core holders with fixed pore volume were prepared for the second stage of the experiment. At this stage the pore volume was approximately constant and the variation included different values of SDS concentrations (0.1 and 0.001 Molar) and different values of salinity (1000 P.P.M and 3000 P.P.M) and temperature equal to  90 °C. Each value for concentration was experimented with the two values of salinity which in result obtaining four flooding conditions. Each condition was flooded by three injection rates (50, 120, 200 %). The results proved the results obtained from the first stage.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Automatic Health Speech Prediction System Using Support Vector Machine
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (3)
Scopus
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Feb 25 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Block Matching Algorithm Using Mean and Low Order Moments
...Show More Authors

In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Wuhaib, K.m. , Hadi, B.h. , Hassan, W.a. Iraqi Journal Of Agricultural Sciences, 2016, 47(5), Pp. 1151–1165
Some genetic parameter in maize using full diallel crosses
...Show More Authors

Scopus (8)
Scopus
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.