Preferred Language
Articles
/
joe-574
Estimation of Minimum Miscibility Pressure for 〖CO〗_2 Flood Based on EOS
...Show More Authors

CO2 Gas is considered one of the unfavorable gases and it causes great air pollution. It’s possible to decrease this pollution by injecting  gas in the oil reservoirs to provide a good miscibility and to increase the oil recovery factor. MMP was estimated by Peng Robinson equation of state (PR-EOS). South Rumila-63 (SULIAY) is involved for which the miscible displacement by  is achievable based on the standard criteria for success EOR processes. A PVT report was available for the reservoir under study. It contains deferential liberation (DL) and constant composition expansion (CCE) tests.  PVTi software is one of the (Eclipse V.2010) software’s packages, it has been used to achieve the goal.  Many trials have been done to match the data of DL test by tuning some of the PR-EOS parameters through the regression analysis process, but no acceptable match was obtained especially for saturation pressure. However; splitting the mole fraction of (C6+) to many pseudo components was carried out, and then a regression analysis process was made again to improve the matching by tuning some of the PR-EOS parameters. A good estimate of saturation pressure and a good match of PVT properties was noted. Ternary diagram has been constructed to represent the phase behavior of -Oil and to calculate MMP for the South Rumila-63 (SULIAY) oil well.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis ,spectroscopic study of Antipyryl azo 2-Naphthol and use it as new reagent for determination of Co(II) and Cu(II)
...Show More Authors

A simple ,accurate and sensitive spectrophotometric method has been developed the determination of Cobalt(II) and Cupper (II) .The method is based on the chelation of Co(II) and Cu(II) ions with 4-(4´-pyrazolon azo) -2-Naphthol(APAN) in aqueous medium . The complexes have a maximum absorption at (513) and (506) nm and ? max 0.531×10 4 and 0.12×10 5 L.mol -1.cm -1 for Co(II) and Cu(II) respectively .The reagent and two complexes have been prepared in ethanolic solution.The stoichiometry of both complexes were found to be 1:2 (metal :legend) .The effects of various cations and anions on Co(II) and Cu(II) determination have been investigated .The stability constants and standard deviations for Co(II) and Cu(II) 0.291 x107 ,0.909X108 L.mol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 16 2023
Journal Name
Indonesian Journal Of Chemistry
Synthesis of Zn(II) and Co(II) Complexes with a Schiff Base Derived from Malonic Acid Dihydrazide for Photo-Stabilizers of Polystyrene
...Show More Authors

In this study, novel Schiff base complexes with Zn(II) and Co(II) ions were successfully synthesized. The malonic acid dihydrazide was converted into the Schiff base ligand by combining it with 1-hydroxy-2-naphthaldehyde, and the last step required reacting it with the appropriate metal(II) chloride to produce pure target complexes. The generated complexes were thoroughly characterized using FTIR, 1H-NMR, 13C-NMR, GC-mass, and UV-Vis spectroscopies. In order to photo-stabilize polystyrene (PS) and reduce the photodegradation of its polymeric chains, these chemicals have been used in this work. The efficiency of the generated complexes as photo-stabilizers was evaluated using a variety of techniques, including FTIR, weight loss, visc

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Speech Enhancement Algorithm Based on a Hybrid Estimator
...Show More Authors
Abstract<p>Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra</p> ... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More