Reservoir fluids properties are very important in reservoir engineering computations such as material balance calculations, well testing analyses, reserve estimates, and numerical reservoir simulations. Isothermal oil compressibility is required in fluid flow problems, extension of fluid properties from values at the bubble point pressure to higher pressures of interest and in material balance calculations (Ramey, Spivey, and McCain). Isothermal oil compressibility is a measure of the fractional change in volume as pressure is changed at constant temperature (McCain). The most accurate method for determining the Isothermal oil compressibility is a laboratory PVT analysis; however, the evaluation of exploratory wells often require an esti
... Show MoreWith the massive presence of the critical approaches &, artistical School, movements, methods, Concepts, & theories, which came to take its chance from arts in general view & the plastic arts in special view. The Searches of fine arts & what this methods present from excitement become the point for many questions, & go to the purposes to be useful. For the artistic Work to come out in aesthetic image, especially on the subject of reading& reception, & entering it into layout of multiple relationships, for the artistic Work to be more simulation of the appearances of the things & interpreted it in Accor.
Dance to aesthetic that Limited by the new method. With those Innovative Visions, & Composite Sy
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreTo avoid the negative effects due to inflexibility of the domestic production inresponse to the increase in government consumption expenditure leads to more imports to meet the increase in domestic demand resulting from the increase in government consumption expenditure. Since the Iraqi economy economy yield unilateral depends on oil revenues to finance spending, and the fact government consumer spending is a progressive high flexibility the increase in overall revenues, while being a regressive flexibility is very low in the event of reduced public revenues, and therefore lead to a deficit in the current account position. And that caused the deficit for imbalance are the disruption of the
... Show MoreThe proposed design of neural network in this article is based on new accurate approach for training by unconstrained optimization, especially update quasi-Newton methods are perhaps the most popular general-purpose algorithms. A limited memory BFGS algorithm is presented for solving large-scale symmetric nonlinear equations, where a line search technique without derivative information is used. On each iteration, the updated approximations of Hessian matrix satisfy the quasi-Newton form, which traditionally served as the basis for quasi-Newton methods. On the basis of the quadratic model used in this article, we add a new update of quasi-Newton form. One innovative features of this form's is its ability to estimate the energy functio
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreAn experimental and theoretical investigation of three phase direct contact heat transfer by evaporation of refrigerant drops in an immiscible liquid has been carried out. Refrigerant Rl2 and R134a were used for the dispersed phase, while water and brine were the immiscible continuous phase. A numerical analysis is presented to predict the temperature distribution throughout the circular test column radially and axially is achieved. Experimental measurements of the temperature distribution have been compared with the numerical results and are discussed .A comparison between the experimental and theoretical results showed acceptable agreement and applicability of the derived equations. Comparison with other related work showed similar beh
... Show MoreThe radial wave function R(r) and the radial distribution function P(r) as a function of (r), for the Hydrogen atom was calculated for several atomic state (1s,2s,2p,3s,3p,3d) The results were compared with Hydrogen like atom(He+,Li+2,Be+3).
