Preferred Language
Articles
/
ijcpe-928
Normalize and De-Normalize of Relative Permeability Data for Mishrif Formation in WQ1: An Experimental Work
...Show More Authors

In many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relative permeability of five carbonate for core plugs from the Mishrif formation of WQ1. The relative permeability calculated by using Johnson, Bossler and Naumann (JBN) Correlation, which is, consider one of the unsteady-state approach where it found that the core plugs are water wet. A normalizing approach has been used to remove the effect of irreducible water and residual saturations, which would vary according on the environment. Based on their own irreducible water and trapped saturations, the relative permeabilities can subsequently be de-normalized and assigned to distinct sections (rock types) of the reservoir. The goal of this research is to normalize the relative permeability that was determined through water flooding.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Continuous De-emulsification of Crude Oil Using Packed Column Under Various Conditions
...Show More Authors

This research dealt with desalting of East Baghdad crude oil using pellets of either anionic, PVC, quartz, PE, PP or
nonionic at different temperature ranging from 30 to 80 °C, pH from 6 to 8, time from 2 to 20 minutes, volume percent
washing water from 5 to 25% and fluid velocity from 0.5 to 0.8 m/s under voltage from 2 to 6 kV and / or using additives
such as alkyl benzene sulphonate or sodium stearate. The optimum conditions and materials were reported to remove
most of water from East Baghdad wet crude oil.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Gulf Economist
The Bayesian Estimation in Competing Risks Analysis for Discrete Survival Data under Dynamic Methodology with Application to Dialysis Patients in Basra/ Iraq
...Show More Authors

Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 04 2018
Journal Name
Baghdad Science Journal
Structural Analysis of Chemical and Green Synthesis of CuO Nanoparticles and their Effect on Biofilm Formation
...Show More Authors

Copper oxide nanoparticles (CuO NPs) were synthesized by two methods. The first was chemical method by using copper nitrate Cu (NO3)2 and NaOH, while the second was green method by using Eucalyptus camaldulensis leaves extract and Cu (NO3)2. These methods easily give a large scale production of CuO nanoparticles. X-ray diffraction pattern (XRD) reveals single phase monoclinic structure. The average crystalline size of CuO NPs was measured and used by Scherrer equation which found 44.06nm from chemical method, while the average crystalline size was found from green method was 27.2nm. The morphology analysis using atomic force microscopy showed that the grain size for CuO NPs was synthesized by chemical and green methods were 77.70 and 89.24

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Thu Jan 02 2025
Journal Name
Applied Computing And Informatics
WisdomModel: convert data into wisdom
...Show More Authors

Scopus (3)
Scopus
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Almzna given in the consolation of the Prophet)) for women- an objective stu
...Show More Authors

 My research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad

View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The fragile world In Hi, Sadness Of Françoise Sagan: L’univers fragile dans Bonjour Tristesse De Françoise Sagan
...Show More Authors

The villa was incredible, summer was hot, and the Mediterranean Sea was so near.

      Scil lived happily with her father as they needed no one else. But the visit of a calm and intelligent women caused huge shift in this delightful mess. So, how can this threat be stopped?

      This novel displays to the reader a rich study of human soul to implicitly while being supported by short sentences and characterised  by persons living in a horrible way and  described in very short sentences.Thus,  Françoise Sagan’s imagination was enflamed, and so he shaped ethical imagery in the moste wonderful way in the novel Hi,  Sadness.

Rés

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref