Preferred Language
Articles
/
ijcpe-288
Analytical Model for Detection the Tilt in Originally Oil Water Contacts
...Show More Authors

Many carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system; thus the exact solutions of diffusivity equation could be used explicitly for each region. The reservoir-aquifer zones were linked by a capillary transition zone that reflected the pressure difference across the free water level.
The principle of superposition theorem was applied to perform this link across the free water level to estimate the reflected aquifer pressure drop behavior that holds the fluid contacts in their equilibrium positions.
The results of originally oil water contact positions generated by the proposed model were compared with data obtained from a carbonate oil field; the results given by the model showed full agreement with the actual field data.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 30 2014
Journal Name
Iosr Journal Of Mathematics
Modification Adomian Decomposition Method for solving Seventh OrderIntegro-Differential Equations
...Show More Authors

In this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.

View Publication
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Volterra Runge- Kutta Methods for Solving Nonlinear Volterra Integral Equations
...Show More Authors

In this paper Volterra Runge-Kutta methods which include: method of order two and four will be applied to general nonlinear Volterra integral equations of the second kind. Moreover we study the convergent of the algorithms of Volterra Runge-Kutta methods. Finally, programs for each method are written in MATLAB language and a comparison between the two types has been made depending on the least square errors.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Utilizing Home Pregnancy Test Kits for Diagnosis of Leaking Liquor
...Show More Authors

Before the start of delivery, any membranes rupture could be named as a premature rupture of membranes (PROM), which may need special obstetrical interactions to minimize perinatal complications, it is important topromptly diagnose PROM, the method used should be accurate, cheap, simple, and widely available. This was exactly the idea behind this study to use an ordinary pregnancy test kit aiming to confirm presence of PROM.Over a 6 months’ period, 60 pregnant women with a history of leaking liquor and a positive speculum examination for amniotic fluid pooling were collected prospectively and compared with other 60 women (control group) with uneventful pregnancy. Majority of patients with positive leaking liquor signs and symptoms had a p

... Show More
View Publication
Publication Date
Sun May 16 2021
Journal Name
Graphs And Combinatorics
Commuting Involution Graphs for Certain Exceptional Groups of Lie Type
...Show More Authors
Abstract<p>Suppose that <italic>G</italic> is a finite group and <italic>X</italic> is a <italic>G</italic>-conjugacy classes of involutions. The commuting involution graph <inline-formula><alternatives><tex-math>$${\mathcal {C}}(G,X)$$</tex-math><math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mrow> <mi>C</mi> <mo>(</mo> <mi>G</mi> <mo>,</mo> <mi>X</mi> <mo>)</mo> </mrow> </math></alternatives></inline-formula> is</p> ... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 16 2022
Journal Name
Clean Technologies
Performance Evaluation of Roughened Solar Air Heaters for Stretched Parameters
...Show More Authors

Crossref (2)
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Feb 01 2026
Journal Name
Applied Acoustics
Development of an acoustic vacuum gauge for low-pressure measurement
...Show More Authors

View Publication
Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
CuInS2 Ternary Compound as Absorption Layer for Solar Cell Fabrication
...Show More Authors

Copper indium disulphide, CuInS2, is a promising absorber material for thin film photovoltaic which has recently attracted considerable attention due to its suitability to reach high efficiency solar cells by using low cost techniques. In this work CuInS2 thin films have been deposited by chemical spray pyrolysis onto glass substrates at ambient atmosphere, using different [Cu]/[In] ratio in the aqueous solutions at substrate temperature 3000C
and different annealing temperatures . Structural and optical properties of CIS films were analyzed by X-ray diffraction, and optical spectroscopy. Sprayed CIS films are polycrystalline with a chalcopyrite structure with a preferential orientation along the 112 direction and no remains of oxides

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An adaptive neural control methodology design for dynamics mobile robot
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref