Preferred Language
Articles
/
ijcpe-998
Optimization of Gas Lifting Design in Mishrif Formation of Halfaya Oil Field
...Show More Authors

The optimization of artificial gas lift techniques plays a crucial role in the advancement of oil field development. This study focuses on investigating the impact of gas lift design and optimization on production outcomes within the Mishrif formation of the Halfaya oil field. A comprehensive production network nodal analysis model was formulated using a PIPESIM Optimizer-based Genetic Algorithm and meticulously calibrated utilizing field-collected data from a network comprising seven wells. This well group encompasses three directional wells currently employing gas lift and four naturally producing vertical wells. To augment productivity and optimize network performance, a novel gas lift design strategy was proposed. The optimization of gas allocation was executed to maximize oil production rates while minimizing the injected gas volume, thus achieving optimal oil production levels at the most effective gas injection volume for the designated network. The utilization of the PIPESIM Optimizer, founded on genetic algorithm principles, facilitated the attainment of these optimal parameters. The culmination of this study yielded an optimal oil production rate of 18,814 STB/d, accompanied by a gas lift injection rate of 7.56 MMscf/d. This research underscores the significance of strategic gas lift design and optimization in enhancing oil recovery and operational efficiency in complex reservoir systems like the Mishrif formation within the Halfaya oil field.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Sep 09 2015
Journal Name
Elixir
Effect Tiers Pressure and Speeds tractor on Performance Chisel and Disc Plows
...Show More Authors

Field experiment conducted to measured Slippage, Effective field capacity, Field Efficiency, Soil Volume Disturbed and Specific Productivity Tillage in silt clay loam soil with depth 18 cm in Baghdad- Iraq. Split – split plot design under randomized complete block design with three replications using Least Significant Design 5 % was used. Three factor used in this experiment included Two types of plows included Chisel and Disk plows which represented main plot , Three Tires Inflation Pressure was second factor included 1.1 ,1.8 and 2.7 Bar, and Three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Result show chisel plow recorded best parameters performance

Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Projective MDS Codes Over GF(27)‎
...Show More Authors

MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix.   In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over  of length  and 28 have been found.

View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Nasaq
Types and functions of comparisons (based on Russian and Arabic phraseological units) Типы и функции сравнений (на материале русских и арабских фразеологизмов) انواع ووظائف المقارنات )في االمثال الروسية والعربية
...Show More Authors

Comparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russia

... Show More
Publication Date
Sun Jun 01 2025
Journal Name
Chemical Review And Letters
Synthesis, structural characterization, biological evaluation and industrial application of (E)-4-((5-chloro-2-hydroxyphenyl)diazenyl)-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one and its metal complexes
...Show More Authors

The reaction of 1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one with one equivalent of 4-chlorophenol by coupling reaction afforded (E)-4-((5-chloro-2- hydroxyphenyl)diazenyl)-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one. Then azo ligand was characterize using spectroscopic studies ( FTIR,UV-Vis, 1H and 13CNMR, Mass) also micro-elemental analysiz (C.H.N.O). Transition metal chelation with Co(II), Ni(II), Cu(II), and Zn(II) was investigated, revealing 1:2 metal-to-ligand stoichiometry with octahedral geometry. The biological, and industrial application for the azo ligand and it is complexes were evaluated, demonstrating antimicrobial activity against bacterial and fungal strains, with the Zn(II) complex exhibiting superior inhibition. Additionally,

... Show More
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Issam al-Din al-Asfrani's footnote On the interpretation of the oval Imam Issam al-Din Ibrahim Arbashah al-Asfrani (Th 159 e)   Surah Al-Baqarah (verse 55-911)
...Show More Authors

Issam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
  Surah Al-Baqarah (verse 55-911)

View Publication Preview PDF
Publication Date
Tue Jun 05 2018
Journal Name
Journal Of Molecular Structure
Synthesis, characterization, experimental and theoretical structure of novel Dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-ylkN3] pyridine-kN})metal(II) compounds, metal ¼ Mn, Co and Ni
...Show More Authors

The syntheses, characterizations and structures of three novel dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II), [M(L)2Cl2], complexes (metal = Mn, Co and Ni) are presented. In the solid state the molecules are arranged in infinite hydrogen-bonded 3D supramolecular structures, further stabilized by weak intermolecular π…π interactions. The DFT results for all the different spin states and isomers of dichloro(bis{2-[1-phenyl-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II) complexes, [M(L1)2Cl2], support experimental measurements, namely that (i) d5 [Mn(L1)2Cl2] is high spin with S = 5/2; (ii) d7 [Co(L1)2Cl2] has a spin state of S = 3/2, (iii) d8 [Ni(L1)2Cl2] has a spin state of S =

... Show More
Preview PDF