Preferred Language
Articles
/
IxbDCYoBVTCNdQwCUZDc
Polyaniline-graphite nanocomposite based modified cladding optical fiber gas sensors
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Apr 22 2019
Journal Name
Spe
Evaluation of Gas and Downhole Water Sink-Assisted Gravity Drainage GDWS-AGD Process in Saturated Oil Reservoirs with Infinite-Acting Aquifer
...Show More Authors
Abstract<p>A hybrid Gas-Enhanced and Downhole Water Sink-Assisted Gravity Drainage (GDWS-AGD) process has been suggested to enhance oil recovery by placing vertical injectors for CO2 at the top of the reservoir with a series of horizontal oil-producing and water-drainage wells located above and below the oil-water contact, respectively. The injected gas builds a gas cap that drives the oil to the (upper) oil-producing wells while the bottom water-drainage wells control water cresting. The hybrid process of GDWS-AGD process has been first developed and tested in vertical wells to minimize water cut in reservoirs with bottom water drive and strong water coning tendencies. The wells were dual-compl</p> ... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Fuel
Experimental influence assessments of water drive and gas breakthrough through the CO2-assisted gravity drainage process in reservoirs with strong aquifers
...Show More Authors

Mature oil reservoirs surrounded with strong edge and bottom water drive aquifers experience pressure depletion and water coning/cresting. This laboratory research investigated the effects of bottom water drive and gas breakthrough on immiscible CO2-Assisted Gravity Drainage (CO2-AGD), focusing on substantial bottom water drive. The CO2-AGD method vertically separates the injected CO2 to formulate a gas cap and Oil. Visual experimental evaluation of CO2-AGD process performance was performed using a Hele-Shaw model. Water-wet sand was used for the experiments. The gas used for injection was pure CO2, and the “oleic” phase was n-decane with a negative spreading coefficient. The aqueous phase was deionized water. To evaluate the feasibilit

... Show More
View Publication
Scopus (13)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Hybrid Transform Based Denoising with Block Thresholding
...Show More Authors

A frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 21 2021
Journal Name
The 3rd Al-noor International Conference Of Science And Technology 2021 Muscat-oman
Gama Platform Survey for Agent-Based Modelling
...Show More Authors

The agent-based modeling is currently utilized extensively to analyze complex systems. It supported such growth, because it was able to convey distinct levels of interaction in a complex detailed environment. Meanwhile, agent-based models incline to be progressively complex. Thus, powerful modeling and simulation techniques are needed to address this rise in complexity. In recent years, a number of platforms for developing agent-based models have been developed. Actually, in most of the agents, often discrete representation of the environment, and one level of interaction are presented, where two or three are regarded hardly in various agent-based models. The key issue is that modellers work in these areas is not assisted by simulation plat

... Show More
View Publication
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Genetic--Based Face Retrieval Using Statistical Features
...Show More Authors

Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus