In many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relative permeability of five carbonate for core plugs from the Mishrif formation of WQ1. The relative permeability calculated by using Johnson, Bossler and Naumann (JBN) Correlation, which is, consider one of the unsteady-state approach where it found that the core plugs are water wet. A normalizing approach has been used to remove the effect of irreducible water and residual saturations, which would vary according on the environment. Based on their own irreducible water and trapped saturations, the relative permeabilities can subsequently be de-normalized and assigned to distinct sections (rock types) of the reservoir. The goal of this research is to normalize the relative permeability that was determined through water flooding.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThis research dealt with desalting of East Baghdad crude oil using pellets of either anionic, PVC, quartz, PE, PP or
nonionic at different temperature ranging from 30 to 80 °C, pH from 6 to 8, time from 2 to 20 minutes, volume percent
washing water from 5 to 25% and fluid velocity from 0.5 to 0.8 m/s under voltage from 2 to 6 kV and / or using additives
such as alkyl benzene sulphonate or sodium stearate. The optimum conditions and materials were reported to remove
most of water from East Baghdad wet crude oil.
Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete
... Show MoreCopper oxide nanoparticles (CuO NPs) were synthesized by two methods. The first was chemical method by using copper nitrate Cu (NO3)2 and NaOH, while the second was green method by using Eucalyptus camaldulensis leaves extract and Cu (NO3)2. These methods easily give a large scale production of CuO nanoparticles. X-ray diffraction pattern (XRD) reveals single phase monoclinic structure. The average crystalline size of CuO NPs was measured and used by Scherrer equation which found 44.06nm from chemical method, while the average crystalline size was found from green method was 27.2nm. The morphology analysis using atomic force microscopy showed that the grain size for CuO NPs was synthesized by chemical and green methods were 77.70 and 89.24
... Show MoreMy research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad
The villa was incredible, summer was hot, and the Mediterranean Sea was so near.
Scil lived happily with her father as they needed no one else. But the visit of a calm and intelligent women caused huge shift in this delightful mess. So, how can this threat be stopped?
This novel displays to the reader a rich study of human soul to implicitly while being supported by short sentences and characterised by persons living in a horrible way and described in very short sentences.Thus, Françoise Sagan’s imagination was enflamed, and so he shaped ethical imagery in the moste wonderful way in the novel Hi, Sadness.
Rés
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More