Preferred Language
Articles
/
ijcpe-1027
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can be done in a single trip by using the ball-and-sleeve method. Metallurgy and hydrogenated nitrile are sealing elementary constituent of chromium which are essential materials found in alloy with 13% of chromium.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
FTIR and Electrical Behavior of Blend Electrolytes Based on (PVA/PVP)
...Show More Authors

Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (45)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (25)
Crossref (13)
Scopus Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection of the application TD-ABC approach on profits persistence Applied study in the General State of Hydraulic Industries Factory of Plastic*
...Show More Authors

The interest of many companies has become dealing with the tools and methods that reduce the costs as one of the most important factors of successful companies, and became the subject of the attention of many economic units because of the impact on the profits of company, and since the nineties of the last century the researchers and writers gave great attention to this subject, especially in light of the large competition and rapid developments in cost management techniques, as well as the wide and significant change in production methods that have been directed towards achieving customer satisfaction, all this and more driven by economic units in all sectors whether it is service or productivity to find methods that would reduc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 21 2019
Journal Name
Journal Of The College Of Education For Women
Measuring the Social Phobia Fifth-Secondary Stage Female Students
...Show More Authors

The current research aims to know the measurement of the fifth- secondary stage female  students' affliction with the social phobia . The research is confined to General directorate of Education in Baghdad / Al-Karkh/2 / for the academic year 2015-2016 and fifth-secondary stage female students. It has been used descriptive method and  exposed theoretical sides and previous studies concerning with the  social phobia.The procedures of the research include the application of the  social phobia scale on random sample of  fifth- secondary stage female  students ( both  branches scientific and literary). The current study has concluded  that the  fifth- secondary stage female  students have&nbs

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Economic globalization adapts to a new stage of development
...Show More Authors

the pursue of social  systems history present to us solid evidence that the collapse of  that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate  auto adaptation mechanism and use it excellently in the right time.

The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob

... Show More
View Publication Preview PDF
Crossref