In many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relative permeability of five carbonate for core plugs from the Mishrif formation of WQ1. The relative permeability calculated by using Johnson, Bossler and Naumann (JBN) Correlation, which is, consider one of the unsteady-state approach where it found that the core plugs are water wet. A normalizing approach has been used to remove the effect of irreducible water and residual saturations, which would vary according on the environment. Based on their own irreducible water and trapped saturations, the relative permeabilities can subsequently be de-normalized and assigned to distinct sections (rock types) of the reservoir. The goal of this research is to normalize the relative permeability that was determined through water flooding.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
98 samples were collected from various clinical sources included (Burns, wounds, urines, sputums, blood) From the city of Baghdad, After performing the biochemical and microscopic examination, 52 isolates were obtained for Pseudomonas aeruginosa, 17 (32.7%) isolates from burn infection, 12 (23%) isolates from Wound infection 11 (21.2%) isolates from urine infection, 7 (13.5%) isolates of sputum and 5 (9.6%) isolates from blood. Bacteria susceptibility to form biofilm has been detectedby microtiter plate method, The results showed that 80% of the bacterial isolates were produced the biofilm with different proportions, alg D gene (alginate production) has been detected by polymerase chain reaction (PCR) Which plays an essential role in the fo
... Show MoreThe effect of time (or corrosion products formation) on corrosion rates of carbon steel pipe in aerated 0.1N NaCl
solution under turbulent flow conditions is investigated. Tests are conducted using electrochemical polarization
technique by determining the limiting current density of oxygen reduction in Reynolds number range of 15000 to 110000
and temperature range of 30 to 60oC. The effect of corrosion products formation on the friction factor is studied and
discussed. Corrosion process is analyzed as a mass transfer operation and the mass transfer theory is employed to
express the corrosion rate. The results are compared with many proposed models particularly those based on the
concept of analogy among momentum, heat,
The study area comprises Injana Formation (Late Miocene), exposed on the hills nearby of Tharthar Lake and about 120 km north of Baghdad city. This study depends on sedimentologic and facies analysis to recognize paleoenvironment and recognize the kinds of vertebrate bone fossils during Late Miocene. Sedimentologic and facies analysis showed many sedimentary facies: facies (Se) of scoured erosional surface, facies of (Sp) cross- bedded sandstones, facies (Fs) of fine sandstone facies, facies of (Fc) claystone, and facies of (C) calcareous clay. Facies analysis referred to the sub environments which are: point bar, over bank and floodplain in addition to fining upward cycles of deposition, which refers to meandering flu
... Show MoreThis article briefly analyzing contemporary works appeared in theater writer from Latin America, which comes within the theme of "power." Latin American Literature, such as two-way extremely clear: the vanguard of social and attention, have arrived at certain moments to some extent be regarded as a two-way rival. That desire to participate in the revolution of expression and artistic significance, has appeared evident in the literature of Latin America in the late nineteenth century and ended in the third decade of the twentieth century. The writers that stage would prefer not to serve the objectives of the revolution of Arts own but the objectives of social and political revolution that stimulate the world. These acts were issued
... Show MoreAbstract
To evaluate the effectiveness of Phenolic Compound of Salvia Frigida on induced atopic dermatitis (AD) of mice. Forty mice were included in the study, divided in to four groups (10 mice/group): apparently healthy, induced AD without treatment, induced AD treated with tacrolimus 0.1% ointment, and induced AD treated with Phenolic Compound of Salvia Frigida cream 5%. Examination of histopathology was done and skin homogenates levels also measured. Levels of WBC, Eosinophil, skin tissue homogenate of IL-13 and IL-4, serum IgE, and histopathological scores were significantly increased among induced non treated AD group in comparison with control group. Comparisons of non-treated induced AD
... Show MoreThe aim of organizational contemporary is development man power active, in spit-of there are littlie resources. But in the Iraqi environment there are too much resources with performance inhabiting. specially in the ministry of water resources (sample of this research), about dryness and lower levels of rivers. There for this study have some important variable, it is ethical leadership & transformational leadership as (independent variable), and Perceived organizational support(dependent variable). Over here to invest with authority on the problem of research, is weakness harmony between employed perception and the pattern of leadership. We find decline in of reaction of organ compound between the variable to weaken high perf
... Show MoreThe presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two
... Show More