Preferred Language
Articles
/
_xifRpcBVTCNdQwCc5bi
Gas Lift Optimization for Zubair Oil Field Using Genetic Algorithm-Based Numerical Simulation: Feasibility Study
...Show More Authors

The gas-lift method is crucial for maintaining oil production, particularly from an established field when the natural energy of the reservoirs is depleted. To maximize oil production, a major field's gas injection rate must be distributed as efficiently as possible across its gas-lift network system. Common gas-lift optimization techniques may lose their effectiveness and become unable to replicate the gas-lift optimum in a large network system due to problems with multi-objective, multi-constrained & restricted gas injection rate distribution. The main objective of the research is to determine the possibility of using the genetic algorithm (GA) technique to achieve the optimum distribution for the continuous gas-lift injection flows in the structure of the network of Zubair, oil field with 10 gas-lift injected wells. This will be done through numerical simulation and modeling studies. The overall enhancement of the filed production rate is found to have increased from 15767 STB/day to 19847 STB/day. The well's reservoir pressure and water cut sensitivity studies are carried out to study the possible impacts of these elements upon the well and its efficiency through the course of the field. Our understanding of the potential benefits of utilizing gas lift techniques in a field from a technical and economical point of view is deepened by the use of examples from economic analysis. Furthermore, even though the idea of employing GA in this manner is not new, this work discusses GA-based optimization methodologies for increasing the oil production rate by using gas lifting in a Zubair oilfield. In order to assign gas injection rates to specific wells in a network throughout the field using limited gas injection rates, the model for optimization will be laid out step-by-step making it simple to understand and employ as a guide, especially for the front-line production technicians involved in the development and design of gas-lift systems.

Crossref
View Publication
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE: GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE
...Show More Authors

This researchpaper includes the incorporation of Alliin at various energy levels and angles 

With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Simulation and experimental study of Pin-Plate DC discharge plasma technique
...Show More Authors

The present work intends to study of dc glow discharge were generated between pin (cathode) and a plate (anode) in Ar gas is performed using COMSOL were used to study electric field distribution along the axis of the discharge and also the distribution of electron density and electron temperature at constant pressure (P=.0.0mbar) and inter electrode distance (d=4 cm) at different applied voltage for both pin cathode system and plate anode and comparison with experimental results.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Numerical Modeling of Renal Ionic Equilibrium for Implantable Kidney Applications
...Show More Authors

The human kidney is one of the most important organs in the human body; it performs many functions
and has a great impact on the work of the rest of the organs. Among the most important possible treatments is
dialysis, which works as an external artificial kidney, and several studies have worked to enhance the
mechanism of dialysate flow and improve the permeability of its membrane. This study introduces a new
numerical model based on previous research discussing the variations in the concentrations of sodium,
potassium, and urea in the extracellular area in the blood during hemodialysis. We simulated the differential
equations related to mass transfer diffusion and we developed the model in MATLAB Simu

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Anemia Blood Cell localization Using Modified K- Means Algorithm
...Show More Authors

View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Scheduling projects using dynamic programming style and smart algorithm
...Show More Authors

The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.

It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 25 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Block Matching Algorithm Using Mean and Low Order Moments
...Show More Authors

In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c

... Show More
View Publication Preview PDF
Crossref