Preferred Language
Articles
/
joe-2278
New Correlation for Predicting Undersaturated Oil Compressibility for Mishrif Reservoir in the Southern Iraqi Oil Fields
...Show More Authors

Reservoir fluids properties are very important in reservoir engineering computations such as material balance calculations, well testing analyses, reserve estimates, and numerical reservoir simulations. Isothermal oil compressibility is required in fluid flow problems, extension of fluid properties from values at the bubble point pressure to higher pressures of interest and in material balance calculations (Ramey, Spivey, and McCain). Isothermal oil compressibility is a measure of the fractional change in volume as pressure is changed at constant temperature (McCain). The most accurate method for determining the Isothermal oil compressibility is a laboratory PVT analysis; however, the evaluation of exploratory wells often require an estimate of the fluid behavior prior to obtaining a representative reservoir sample. Also, experimental data is often unavailable.Empirical correlations are often used for these purposes.
This paper developed a new mathematical model for calculating undersaturated oil compressibility using 129 experimentally obtained data points from the PVT analyses of 52 bottom hole fluid samples from Mishrif reservoirs in the southern Iraqi oil fields. The new undersaturated oil compressibility correlation developed using Statistical Analysis System (SAS) by applying nonlinear multiple regression method. It was found that the new correlation estimates undersaturated oil compressibility of Mishrif reservoir crudes in the southern Iraqi oil fields much better than the published ones. The average absolute relative error for the developed correlation is 7.16%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Automatic Approach for Word Sense Disambiguation Using Genetic Algorithms
...Show More Authors

Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Apr 09 2022
Journal Name
Wireless Personal Communications
Strongly Connected Ramanujan Graphs for Highly Symmetric LDPC Codes
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Anovel Immunological Technique for Identification of Human Seminal Fluid
...Show More Authors

An immunological technique was investigated for the detection of human semen in forensic analysis.This technique included a preparation of anti-human seminal plasma antibodies, by immunizing rabbits with treated human semen. The human semen was treated with an acid to prevent cross reactivity with other human body fluids. The antibody produced was tested against different animal,s seminal fluid samples (dog, goat ,sheep, cow) and human body fluids( saliva, blood , vaginal fluid, ear wax and human semen). It was found that using this developed technique was only selectively responsed with human semen . The prepered kit was evaluated and tested in Forensic laboratory- Ministry of Health. Finally, results were obtained in a c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation of Anise and Thyme Lotion for Topical Use
...Show More Authors

Anise and thyme crude extract were used to prepare a lotion for topical application due to their antimicrobial, germicidal and antifungal effects. Two formulas were prepared using the mentioned natural plants, formula 2 (selected lotion) was the most acceptable one which contained veegum and xanthan gum as suspending agents in addition to other exceipients providing it good properties with high physical stability because of its flocculating, pouring, resuspending easily with sedimentation volume (F) 0.96. In addition to unchangeable odor and color with expiration date of one year. While the Preliminary clinical study was done using this lotion on 10 patients with infecious viral skin diseases, it was found that this lotion was successful

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytical Methods for Determination of Ketoprofen Drug: A review
...Show More Authors

Ketoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Mon Nov 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Al-nahrain Journal Of Science
Modified third order iterative method for solving nonlinear equations
...Show More Authors

Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.

Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Generation of Weak Coherent Pulses for Quantum Cryptography Systems
...Show More Authors

This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.

View Publication Preview PDF
Publication Date
Sat May 19 2012
Journal Name
Wireless Personal Communications
Stable-Aware Evolutionary Routing Protocol for Wireless Sensor Networks
...Show More Authors

Scopus (37)
Crossref (29)
Scopus Clarivate Crossref