Preferred Language
Articles
/
ijcpe-896
Application of Finite Element Technique: A Review Study
...Show More Authors

The finite element approach is used to solve a variety of difficulties, including well bore stability, fluid flow production and injection wells, mechanical issues and others. Geomechanics is a term that includes a number of important aspects in the petroleum industry, such as studying the changes that can be occur in oil reservoirs and geological structures, and providing a picture of oil well stability during drilling. The current review study concerned about the advancements in the application of the finite element method (FEM) in the geomechanical field over a course of century.

Firstly, the study presented the early advancements of this method by development the structural framework of stress, make numerical computer solution for 2D thermal stress then stress analysis of the airplane. The second part focused on the most recent developments of FEM, and this method generates new techniques for solving these problems, such as the 1D, 2D, and 3D finite element models; the dynamic program method (DPM); the finite discrete element method (FDEM); and the finite element extended method (FEXM). The third part of this study presented the reservoir finite element simulation used for injection well testing inside unconsolidated oil sand reservoirs. Also improvement of the FE software program for the analyses, finite element extended approach to convert a 3D fault model were introduced. In addition, the study explored the development of a 3D and 4D model utilizing Visage for FEM analysis for geomechanics investigations, and the software eclipse for pressure drop prediction in carbonate reservoir weak formation and presented the Finite-Element Smoothed Particle Method (FESPM).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Journal Of Research In Medical And Dental Science
A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique
...Show More Authors

A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique, Omar Jihad Banawi*, Raghad

View Publication Preview PDF
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Steganography Technique using Genetic Algorithm
...Show More Authors

Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Domestic Technique in Batik Art
...Show More Authors

Domestic Technique in Batik Art

View Publication Preview PDF
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Biological Activity of Complexes of Some Amino Acid: Review
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Biological Activity of Complexes of Some Amino Acid: Review
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Engineering
Analysis of Shell and Double Concentric Tube Heat Exchanger Using CFD Application
...Show More Authors

This study focuses on CFD analysis in the field of the shell and double concentric tube heat exchanger. A commercial CFD package was used to resolve the flow and temperature fields inside the shell and tubes of the heat exchanger used. Simulations by CFD are performed for the single shell and double concentric tube.

This heat exchanger included 16 tubes and 20 baffles. The shell had a length of 1.18 m and its diameter was 220 mm. Solid Works 2014, ANSYS 15.0 software was used to analyze the fields of flow and temperature inside the shell and the tubes. The RNG k-ε model was used and it provided good results. Coarse and fine meshes were investigated, showing that aspect ratio has no significant effect. 14 million

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
...Show More Authors

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Determines the application of smart tourism as an electronic commerce application in the form of B2C) to attract tourists to Saudi Arabia
...Show More Authors

Abstract:

The study focused on the application of smart tourism as one of the applications of electronic commerce in the form of (B2C) to attract tourists to Saudi Arabia, where the tourism sector is one of the important sectors on which the Kingdom depends on the diversity of its economy.

The purpose of the research: With the issuance of tourist visas for the first time the study noted a deterioration in the case of Saudi tourist sites over the Internet, which do not live up to this great interest by the Saudi government for this sector, which became vital to them. The study tried to identify the reality of the Saudi tourist sites through the Internet in order to identify the sui

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 17 2019
Journal Name
Iraqi Journal Of Science
An Approximation Technique for Fractional Order Delay Differential Equations
...Show More Authors

In this research article, an Iterative Decomposition Method is applied to approximate linear and non-linear fractional delay differential equation. The method was used to express the solution of a Fractional delay differential equation in the form of a convergent series of infinite terms which can be effortlessly computable.
The method requires neither discretization nor linearization. Solutions obtained for some test problems using the proposed method were compared with those obtained from some methods and the exact solutions. The outcomes showed the proposed approach is more efficient and correct.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology
Study the genotoxicity of aqueous and alcoholic extracts of adhatoda vasica on the roots of allium cepa L. By RAPD-PCR technique
...Show More Authors

Scopus