An experimental study was performed to investigate the impact of low salinity water on wettability alteration in carbonate core samples from southern Iranian reservoirs by spontaneous imbibition. In this paper, the effect of temperature, salinity, permeability and connate water were investigated by comparing the produced hydrocarbon curves. Contact angle measurements were taken to confirm the alteration of surface wettability of porous media. Oil recovery was enhanced by increasing the dilution ratio of sea water, and there existed an optimum dilution ratio at which the highest oil recovery was achieved. In addition, temperature had a very significant impact on oil recovery from carbonate rocks. Furthermore, oil recovery from a spontaneous imbibition process was directly proportional to the permeability of the core samples. The presence of connate water saturation inside the porous media facilitated oil production significantly. Also, the oil recovery from porous media was highly dependent on ion repulsion/attraction activity of the rock surface which directly impacts on the wettability conditions. Finally, the highest ion attraction percentage was measured for sodium while there was no significant change in pH for all experiments. 相似文献
This paper presents a data compaction/randomization based approach as a mode of block encryption for ATM (Asynchronous Transfer
Mode) cells. The presented approach converts a plaintext into pseudo‐random plaintext before ciphering to conceal patterns
in the plaintext. The underlying idea behind this scheme is the Shannon's principles of “confusion” and “diffusion” which
involve breaking dependencies and introducing as much randomness as possible into the ciphertext. In this scheme, confusion
and diffusion are introduced into the system by first compressing the ATM cell payload and then spreading a continuously changing
random data over the entire content of the cell. As a mode of operation for block ciphering, this scheme offers the following
attractive features:(i) plaintext patterns are pseudo‐randomized and chained with ciphertext (thereby, preventing against
“dictionary”, “known plaintext”, and “statistical analysis” attacks), (ii) it is self‐synchronizing, (iii) cell loss has no
additional negative effect, (iv) no IV (Initialization Vector) storage is required, (v) it is encryption‐algorithm independent,
(vi) there is no cell‐to‐cell dependency (no feedback from previous cells), and (vii) it is highly scalable (i.e., cells from
the same stream can be ciphered and deciphered in parallel). This paper also presents a secure mechanism for in‐band synchronization
of encryption/decryption key updates using a “marker‐cell” that is carried within the data channel. An important aspect of
both the above mechanisms is that they do not require any changes to the ATM cell header or ATM infrastructure.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
This paper presents the modeling and analysis of a proposed label–quality of service (QoS) switching protocol for heterogeneous robot in a swarm. Establishing the data communication and network in multirobot task allocation is an important aspect in robot collaboration. Instead of passing the data through the cloud network, each robot can be configured as a node in its swarm for intercommunication. This research was conducted to model and propose aggregation and classification methods in a swarm robot network inspired from multiprotocol label switching, namely, label‐QoS switching protocol. Each packet of data is forwarded with a proposed 2‐side label values that are concerned with addressing and QoS. This proposed protocol was applied in each of the node's routing, and it was set up with forwarding information table. The simulation and analysis were conducted in 2 situations: (1) with a constant n–label switch mobile robot and a number of packet data increasing with time and (2) with a constant number of packet and varying n–label switch mobile robot by time. With reference to the network parameter performances, it shows that the anomaly treatment by the proposed protocol is able to prioritize the data forwarding between the robots at the edge of the swarm with class of service although the robot community at the center is increasing or getting crowded. 相似文献
To speed up data‐intensive programs, two complementary techniques, namely nested loops parallelization and data locality optimization, should be considered. Effective parallelization techniques distribute the computation and necessary data across different processors, whereas data locality places data on the same processor. Therefore, locality and parallelization may demand different loop transformations. As such, an integrated approach that combines these two can generate much better results than each individual approach. This paper proposes a unified approach that integrates these two techniques to obtain an appropriate loop transformation. Applying this transformation results in coarse grain parallelism through exploiting the largest possible groups of outer permutable loops in addition to data locality through dependence satisfaction at inner loops. These groups can be further tiled to improve data locality through exploiting data reuse in multiple dimensions. 相似文献
In this paper, an algorithm is proposed for detection and joint estimation of parameters of multiple targets using rotating antenna array. This paper is sequel to our previous work addressing a two element antenna array only. Joint estimation of number of targets, the targets’ range, Doppler and their directions of arrivals is carried while the effects of antenna rotation are compensated for a multi element linear array. The effectiveness of the algorithm is verified by the simulation results carried out for an eight element array. The proposed algorithm is able to resolve targets with same range and Doppler. The computations of the proposed algorithm are calculated and comparison is also given with other algorithms.
Photonic Network Communications - This paper proposes an effective method for shaping the radiation pattern intensity of photonic crystal (PhC) light-emitting diode (LED). In this method, the... 相似文献
Wireless Personal Communications - Software-Defined Networks (SDNs) are developed to compensate the complicated function of the controlling parts of the given network elements and making the... 相似文献
Wireless Networks - The original version of this article unfortunately contained a mistake in the title. The correct title has been published with this erratum. 相似文献
The power generation demand is increasing day-by-day throughout the world, therefore, the use of hybrid systems becomes a significant solution. The hybrid renewable energy system (HRES) is used for delivering power in various regions in order to overcome intermittence of wind and solar resources. Because of increasing environmental problems, for example, greenhouse gas emission and energy cost have interested novel research into substitute methods in favour of electrical power generation. Maximum Power Point Tracking (MPPT) control method is a vast deal of novel research used for enhancing the efficiency of HRES. The authors have revealed that the hybrid techniques i.e. Global MPPT, fuzzy-neuro systems, Adaptive Neuro-Fuzzy Inference System (ANFIS), Perturbed and Observe (P&O) + Adaptive Neural Network (ANN) etc. can provide best results as compared to other MPPT control methods. This paper offering a state of art review of MPPT control techniques for HRES. 相似文献
A routing protocol chooses one of the several paths (routes) from a source node to a destination node in the computer network, to send a packet of information. In this paper, we propose a new routing protocol, which we call st-routing protocol, based on st-numbering of a graph. The protocol fits well in noisy environments where robustness of routing using alternative paths is a major issue. The proposed routing protocol provides a systematic way to retry alternative paths without generating any duplicate packets. The protocol works for only those networks that can be represented by biconnected graphs. 相似文献