Academic literature on the topic 'Strictly positive secure capacity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strictly positive secure capacity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Strictly positive secure capacity"

1

Chi-Bao, Le, and Do Dinh-Thuan. "Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access." Bulletin of Electrical Engineering and Informatics 10, no. 2 (2021): 848~855. https://doi.org/10.11591/eei.v10i2.2117.

Full text
Abstract:
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.
APA, Harvard, Vancouver, ISO, and other styles
2

Le, Chi-Bao, and Dinh-Thuan Do. "Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access." Bulletin of Electrical Engineering and Informatics 10, no. 2 (2021): 848–55. http://dx.doi.org/10.11591/eei.v10i2.2117.

Full text
Abstract:
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.
APA, Harvard, Vancouver, ISO, and other styles
3

Anastasov, Jelena, Aleksandra Panajotović, Dejan Milić, and Daniela Milović. "PERFORMANCE OF SECURE COMMUNICATION OVER LAMBDA-FISHER-SNEDECOR FADING CHANNELS." Facta Universitatis, Series: Automatic Control and Robotics 1, no. 2 (2022): 117. http://dx.doi.org/10.22190/fuacr220830010a.

Full text
Abstract:
In this paper, we investigate the physical layer security (PLS) of the traditional Wyner’s wiretap channel model. Secrecy performance analysis is performed assuming a presence of an active eavesdropper trying to overhear the confidential data transmission from the source node to the predefined destination. In what follows, we derive the lower bound of the secrecy outage probability, the strictly positive secrecy capacity as well as the average secrecy capacity, over the composite a-Fisher-Snedecor (a-F) fading environment. According to the analytical results, numerical results are also shown. The impact of the path loss component, the average signal-to-noise ratios over the main/wiretap channel as well as the impact of the fading, the non-linearity of the propagation medium and the shadowing shaping parameter on the PLS metrics is examined. The overall analysis and the obtained results have a high level of generality and also a high level of applicability since the a-F distribution was recently proposed, as the best fit distribution for the channel characterization of the device-to-device wireless communication in the future Beyond 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Dinh-Thuan, Do, and Van Nguyen Minh-Sang. "Secure transmission for uplink and downlink non-orthogonal multiple access system with imperfect channel state information." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 4 (2022): 699–706. https://doi.org/10.12928/telkomnika.v20i4.20934.

Full text
Abstract:
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
APA, Harvard, Vancouver, ISO, and other styles
5

Do, Dinh-Thuan, Minh-Sang Van Nguyen, Thi-Anh Hoang, and Miroslav Voznak. "NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement." Sensors 19, no. 3 (2019): 736. http://dx.doi.org/10.3390/s19030736.

Full text
Abstract:
In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as employing an emerging multiple access scheme, namely non-orthogonal multiple access (NOMA). This paper proposes a new scheme to consider secure performance, to be called relay selection NOMA (RS-NOMA). In particular, we consider metrics to evaluate secure performance in such an RS-NOMA system where a base station (master node in IoT) sends confidential messages to two main sensors (so-called NOMA users) under the influence of an external eavesdropper. In the proposed IoT scheme, both two NOMA sensors and an illegal sensor are served with different levels of allocated power at the base station. It is noticed that such RS-NOMA operates in two hop transmission of the relaying system. We formulate the closed-form expressions of secure outage probability (SOP) and the strictly positive secure capacity (SPSC) to examine the secrecy performance under controlling setting parameters such as transmit signal-to-noise ratio (SNR), the number of selected relays, channel gains, and threshold rates. The different performance is illustrated as performing comparisons between NOMA and orthogonal multiple access (OMA). Finally, the advantage of NOMA in secure performance over orthogonal multiple access (OMA) is confirmed both analytically and numerically.
APA, Harvard, Vancouver, ISO, and other styles
6

Dang, Huu-Phuc, Minh-Sang Van Nguyen, Dinh-Thuan Do, Minh-Hoa Nguyen, Minh-Triet Pham, and Anh-Tuan Kim. "Secure Performance Analysis of Aerial RIS-NOMA-Aided Systems: Deep Neural Network Approach." Electronics 11, no. 16 (2022): 2588. http://dx.doi.org/10.3390/electronics11162588.

Full text
Abstract:
The next generation of wireless systems has benefits in terms of spectrum and energy inefficiencies by exploiting two promising techniques including Non-Orthogonal Multiple Access (NOMA) and Reconfigurable Intelligent Surfaces (RIS). The scenario of two legitimate users existing together with an eavesdropper is worth examining in terms of secure matter while enabling machine learning tools at the base station for expected improvement. The base station deals with a highly complicated algorithm to adjust parameters against the attack of eavesdroppers and to better improve the secure performance of mobile users. This paper suggests a better solution to allow the base station to predict performance at destinations to adjust necessary parameters such as power allocation coefficients properly. To this end, we propose a deep neural network (DNN)-based approach which also leverages the benefits of aerial RIS to achieve predictable performance and significant secure performance improvement could be enhanced. We first derive the formulations for security outage probability (SOP) in closed-form expressions and analyze the strictly positive secrecy capacity (SPSC), which are crucial performance metrics to determine how the systems are against the existence of eavesdroppers. Such eavesdroppers intend to overhear signal transmission dedicated to intended users and incur degraded system performance. The numerical simulations are expected to evaluate how the machine learning tool works with the traditional computation of system performance metrics which is able to be verified by comparing with the Monte-Carlo method. Our numerical simulations demonstrate that the design of a higher number of meta-surface elements at the RIS, as well as a higher signal-to-noise ratio (SNR) levels at the base station, are key parameters to achieving improved security performance for users. For detailed guidelines of the RIS-NOMA aided system, we provide a table of parameters samples resulting in secure performance as expected.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Junxia, Hui Zhao та Michael Johnson. "Secrecy Performance Analysis of a Cognitive Network for IoT over k - μ Channels". Wireless Communications and Mobile Computing 2021 (26 червня 2021): 1–12. http://dx.doi.org/10.1155/2021/5548428.

Full text
Abstract:
With the development of Internet of Things (IoTs), devices are now connecting and communicating together on a heretofore unheard-of scale, forming huge heterogeneous networks of mobile IoT-enabled devices. For beyond 5G- (B5G-) enabled networks, this raises concerns in terms of spectral resource allocation and associated security. Cognitive radio is one effective solution to such a spectrum sharing issue which can be adopted to these B5G networks, which works on the principle of sharing spectrum between primary and secondary users. In this paper, we develop the confidentiality of cognitive radio network (CRNs) for IoT over k - μ fading channels, with the information transmitted between secondary networks with multiple cooperative eavesdroppers, under the constraint of the maximum interference that the primary users can tolerate. All considered facilities use a single-antenna receiver. Of particular interest, the minimum limit values of secure outage probability (SOP) and the probability of strictly positive secrecy capacity (SPSC) are developed for this model in a concise form. Finally, the Monte Carlo simulations for the system are provided to support the theoretical analysis presented.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Sheng-Hong, Rong-Rong Lu, Xian-Tao Fu, An-Ling Tong, and Jin-Yuan Wang. "Physical-Layer Security Analysis over M-Distributed Fading Channels." Entropy 21, no. 10 (2019): 998. http://dx.doi.org/10.3390/e21100998.

Full text
Abstract:
In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Jiangfeng, Zhisong Bie, Hongxia Bie, Pengfei He, and Machao Jin. "Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8842012.

Full text
Abstract:
At present, the fifth generation (5G) communication networks are in the time of large-scale deployment principally because its characteristics consists of large bandwidth, fast response, and high stability. As a partner of 5G, the Internet of Things (IoT) involves billions of devices around the world, which can make the wireless communication environment more intelligent and convenient. However, the problem that cannot be ignored is the physical layer security of 5G-IoT networks. Based on this, we perform a security analysis of cognitive radio networks (CRN) for IoT, where the CRN is the single-input multiple-output (SIMO) model experiencing κ-μ shadowed fading with multiple eavesdroppers. To analyze the confidentiality of the system under consideration, we analyze the security performance for the considered IoT systems with the help of the derived secure outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). As a verification of the theoretical formula, Monte Carlo simulation is also provided. The results of great interest are the factors that can produce better security performance in high SNRs region which consist of smaller M, smaller k, and larger N, and larger μ, smaller IP, and smaller Rth.
APA, Harvard, Vancouver, ISO, and other styles
10

Nguyen, Nhan Duc, Minh-Sang Van Nguyen, and Munyaradzi Munochiveyi. "Empowering Reconfigurable Intelligent Surfaces for Security of Downlink NOMA." Wireless Communications and Mobile Computing 2022 (May 25, 2022): 1–15. http://dx.doi.org/10.1155/2022/1498918.

Full text
Abstract:
Reconfigurable intelligent surfaces (RIS) and non-orthogonal multiple access (NOMA) are promising techniques to develop next-generation wireless systems. While RIS has huge potential to create massive device connectivity, NOMA exhibits its spectrum efficient communication among multiple access approaches. RIS is a passive device made up of low-cost meta-surfaces which can control the propagation of radio waves, and it is easily deployable in lots of applications in the Internet of Things. The full-duplex nature of RIS has also been a major reason for its consideration of major emerging and trending technologies. In this paper, we aim to investigate the secrecy performance of the RIS-NOMA-assisted Internet of Things (IoT) systems in the presence of two legitimate users who belong to a cluster, and those devices are associated with the existence of an eavesdropper situated close to such a cluster. This paper considers the devices in the presence of RIS and an eavesdropper. As main performance metrics, the closed-form expressions for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC) are derived to evaluate the performance of legitimate users. Simulations are performed in support of the Monte-Carlo method, and the obtained results show that in most of the cases, the number of meta-surfaces in RIS and signal-to-noise ratio (SNR) levels at the source also plays a pivotal role in influencing the secure performance of the system.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Strictly positive secure capacity"

1

Korba, Abdelaziz Amara, and Mohamed Amine Ferrag. "A Secure Routing Scheme Against Malicious Nodes in Ad Hoc Networks." In Security and Privacy in Smart Sensor Networks. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5736-4.ch013.

Full text
Abstract:
This chapter proposes a new cluster-based secure routing scheme to detect and prevent intrusions in ad hoc networks. The proposed scheme combines both specification and anomaly detection techniques to provide an accurate detection of wide range of routing attacks. The proposed secure scheme provides an adaptive response mechanism to isolate malicious nodes from the network. A key advantage of the proposed secure scheme is its capacity to prevent wormhole and rushing attacks and its real-time detection of both known and unknown attacks which violate specification. The simulation results show that the proposed scheme shows high detection rate and low false positive rate compared to other security mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
2

Draper, Jamie. "Climate Change and Territorial Sovereignty." In Climate Displacement. Oxford University PressOxford, 2023. http://dx.doi.org/10.1093/oso/9780192870162.003.0004.

Full text
Abstract:
Abstract This chapter examines the threats to territorial sovereignty created by sea-level rise in small-island states such as Kiribati, Tuvalu, the Maldives, and Vanuatu. In the first section of the chapter, I set out an interpretation of the value of self-determination which stresses both independence from arbitrary interference and a positive capacity to exercise collective control. I then leverage this conception of self-determination to critically assess three proposals for small-island states: territorial redistribution, de-territorialized statehood, and intra-state territorial autonomy. I give a cautious defence of intra-state territorial autonomy, arguing that a weak version of de-territorialized statehood cannot secure self-determination in any meaningful sense, and that both territorial redistribution and a strong version of de-territorialized statehood can do so only by creating morally unacceptable costs. Intrastate territorial autonomy, if implemented in ways that reflect the values of small-island peoples, can secure self-determination and at the same time minimize these costs.
APA, Harvard, Vancouver, ISO, and other styles
3

Grotz, Florian, Jan Berz, Corinna Kroeber, and Marko Kukec. "Political Careers and Prime-Ministerial Performance." In Prime Ministers in Central and Eastern Europe. Oxford University PressOxford, 2025. https://doi.org/10.1093/9780198937258.003.0010.

Full text
Abstract:
Abstract This chapter explores how the political experience of prime ministers (PMs) in post-communist Central and Eastern Europe affects their performance in office. It argues that previous political positions help PMs to develop individual assets and enable them to perform more successfully as heads of government. The analyses reveal that previous party leadership experience is the strongest predictor of successful performance as a PM. PMs who were previously party leaders have a particular capacity to secure the support of their own party, to settle cabinet conflicts, and to shape government policies. Lastly, the chapter shows that PMs’ previous participation in communist parliaments and executives also has positive effects on their performance, in particular their ability to shape government policies.
APA, Harvard, Vancouver, ISO, and other styles
4

Taukeni, Simon George, and Matshidiso J. Taole. "Nonviolent Teaching." In Research Anthology on School Shootings, Peer Victimization, and Solutions for Building Safer Educational Institutions. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5360-2.ch032.

Full text
Abstract:
Students need to feel safe and secure in school so that they can perform to their full potential. Therefore, a safe school is an essential element in any learner's progress and functioning. To achieve student healthy development and their capacity to learn, peaceful circumstances must be ensured in the education environment. Thus, violence prevention and nonviolent teaching strategies have become essential focus areas for ongoing research. This chapter focuses on nonviolent teaching techniques that could be used in schools to ensure a positive school climate. The objective is to expand and deepen existing theory on multicultural nonviolent teaching techniques in schools, institutions of high learning, and centers of teacher development and training, in order to better understand nonviolence concepts, related techniques and their applications to achieve desired peaceful outcomes. The chapter further highlights potential forms of school violence, effects on the students and suggests techniques of dealing with the violence.
APA, Harvard, Vancouver, ISO, and other styles
5

Burke, Michael J., Sue Ann Corell Sarpy, and Lina Sofia Valenzuela Dow. "Workplace Safety and Health." In Sustainable Development Through the World of Work. Oxford University PressNew York, NY, 2025. https://doi.org/10.1093/9780197786161.003.0010.

Full text
Abstract:
Abstract Workplace Safety and Health discusses how research in applied psychology has produced insights for establishing positive safety climates and conducting safety and health training to contribute to reductions in occupational illnesses, accidents, and deaths. Along with describing research and practice approaches to safety training and safety climate, this brief indicates how research findings in these domains can be applied to assist in accomplishing select targets associated with United Nations Sustainable Development Goals. More specifically, the brief provides examples for how research findings can be applied to improve workers’ mental health and well-being; strengthen the prevention of illicit substance abuse among workers; decrease the number of global injuries and deaths from road traffic accidents; promote safe and secure working environments for all workers including migrant workers and other vulnerable populations; and strengthen resilience and adaptive capacity to climate-related hazards and natural disasters.
APA, Harvard, Vancouver, ISO, and other styles
6

Ojha, Nitish Kumar, Abhishek Vaish, Shreyansh Dwivedi, Brijesh Kumar Markandey, and Rania El-Gazzar. "A Framework for Detection of Hate Speech in Social Media." In Advances in Social Networking and Online Communities. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-9904-0.ch010.

Full text
Abstract:
The authenticity and the orientation of information in social media require designing a complex information system to analyze the artifacts that may cause a positive or negative impact on the peace order of the global societal structure. Social cyber security is a new paradigm that is gaining momentum worldwide; every country is investing in capacity-building measures, R&D, and strategies to combat the menace of the problem caused by the abundance of manipulative information. Societal cyber security has become a multi-million-dollar market because economic change has monetized data, and it is a top priority for every government to ensure that the digital society is secure and safe. Therefore, it is pertinent to find a framework that can help detect information that can negatively impact society at large. In this paper, we are using machine learning techniques for classification in a fusion dataset of manipulative information that has been concatenated with the benchmark dataset. The subclasses are real news without hate speech, real news with hate speech, fake news with hate speech, and fake news without hate speech. The application of this framework is to be used to mitigate the threat to society through the widespread use of manipulative information and help society to be resilient against such threats.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Strictly positive secure capacity"

1

Xian Liu. "Probability of strictly positive secrecy capacity of the Weibull fading channel." In 2013 IEEE Global Communications Conference (GLOBECOM 2013). IEEE, 2013. http://dx.doi.org/10.1109/glocom.2013.6831147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Xian. "Strictly positive secrecy capacity of log-normal fading channel with multiple eavesdroppers." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Youlong, and Michele Wigger. "Any positive feedback rate increases the capacity of strictly less-noisy broadcast channels." In 2013 IEEE Information Theory Workshop (ITW 2013). IEEE, 2013. http://dx.doi.org/10.1109/itw.2013.6691327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stoica, Marius. "THE IMPROVEMENT OF TRIPLE JUMP TECHNIQUE USING E-TRAINING METHODS." In eLSE 2013. Carol I National Defence University Publishing House, 2013. http://dx.doi.org/10.12753/2066-026x-13-225.

Full text
Abstract:
In the last years, the specialists in sport area are very interested by the biomechanic tests in athletics. In this paper we are presented the Ergosim device, wich is able to analyse the movements at the certain speed, from each angle, in every direction, with ideal amplitude. Through the content of this research issues we are trying to introduce the modern techniques used to increase efficiency of triple jumpers training by optimizing the training process. Ergosim can be approached at any time and is even indicated by the junior age, making a gradual transition from specific means for children and juniors to the means for senior, in the meaning of the harmonious development of muscle groups and of the lack pressure on the spine and joints, which are very much required in working with dumbbell. The exercises can be performed with great amplitude, depending on the strength and the speed of the athlet, laying the basis for improving technique with an optimal speed. Ensuring superior techniques can be achieved by practicing as an optimal model, strictly individualized on Ergosim. Thus, it can be develop a very good proprioceptive memory, which will result in a relaxed rhythm and an optimal ratio of jumping phases, with positive effects of performance at major competitions. Ergosim is assisted by computer, adjusting the speed of execution desired, number of repetitions and brake components. The program has capacity for analysis and synthesis, allowing active recording time, the active work, the mechanical work, the active power, the active speed, guided by computer required speed.
APA, Harvard, Vancouver, ISO, and other styles
5

Al Riyami, Q., M. Al Fazari, D. Mahrezi, H. Subhi, and G. Rajula. "Toward Thermal Operation Decarbonization: Improvements in Solar Steam Production Facility Efficiency for Higher Value and Higher GHG Emissions Savings." In SPE Caspian Technical Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/217520-ms.

Full text
Abstract:
Abstract Petroleum Development Oman LLC (PDO) is Oman's premier oil producer and operates several fields at "A". "A" East and "A" West are located on the eastern flank of the South Oman Salt Basin. As "A" Thermal fields contain heavy oil, PDO plans to significantly increase oil recovery by increasing the steam injection which is having high energy intensity. The objective of this paper is to demonstrate the improvement in the Solar Steam Production Facility Thermal Efficiency (TE) to maximize the value of producing steam and saving higher GHG emissions. Solar Steam facility is a steam production station which absorbs sun rays to produce steam from water further injected into the reservoir to produce the oil in "A". Solar steam facility is designed to produce 1980 T/d with 12 blocks. However, the maximum potential has not been met. In This project, different approaches and process had been used such as lean practice including process mapping, root cause analysis, fishbone. A lean approach known as Practical problem solving (PPS) was followed. This is a structured framework to understand the causes of a sudden behavior change in a defined steps within a process. The analysis included outlining the "SIPOC", i.e. defining the Suppliers, Inputs, Process, Outputs, Customers of this matter, a Detailed Process Mapping, fishbone analysis, the 5-whys, etc. The PPS findings were piloted to verify the outcomes. This paper has led to significant benefits and maximizing its potential. These benefits are outlined below: Maintaining positive pressure inside the glass house will eliminate dust ingress to improve mirror reflectivity and increase steam production. Providing options/ provisions to inject steam in maximum number of steam injectors will result steam units to produce to its maximum capacity. Steam Deferments savings of around 200k Ton annually is saved which resulted to secure around 10% of the field oil production. In addition, a saving of 35.5k tons of CO2e/yr GHG emissions is seen part of this improvements. By improvement this process, it will help to contribute to organization goals in term of production increase, deferment reduction, GHG reduction and cost reduction.
APA, Harvard, Vancouver, ISO, and other styles
6

Haghshenas, Alireza, and Mohammad Hamedpour. "Modeling Supercritical CO2 and Hydrocarbon Adsorption in Nanopores." In SPE Conference at Oman Petroleum & Energy Show. SPE, 2022. http://dx.doi.org/10.2118/200068-ms.

Full text
Abstract:
Abstract Secure storage of carbon dioxide in underground reservoirs has been an increasingly interesting topic for the researches in the recent decade. The literature includes great works covering the idea of storing CO2 in depleted oil and gas fields or deep saline aquifer. In this study, long-term adsorption of CO2 and hydrocarbon gases is discussed as another opportunity to permanently store greenhouse gases and reduce the amount of the carbon dioxide that enters atmosphere. The simplified local-density (SLD) theory was used for matching the experimental data and providing predictions of high-pressure supercritical adsorption isotherms of CO2 and hydrocarbon gases. The SLD model is able to capture the contributions from the fluid-fluid and fluid-solid interactions and, despite the typical assumption of uniform bulk phase density, the model plots the variable density profile of the fluids in nanopore. An extensive set of adsorption measurements available in the literature is used in this evaluation. The slit and cylindrical pore geometry are assessed and the effect of the pressure, temperature, pore size and fluid composition is also discussed in detail. The results show that the SLD-PR model can predict absolute adsorption of the CO2 and hydrocarbon gases within the experimental uncertainty range. For heavier components (C3+), the model illustrates a thicker adsorbed wall close to the pore surface, the adsorption is enhanced while the pressure is increased to a certain point. This observation is in line with the pore-fluid interaction energy which shows a positive trend in terms of molecular size and pressure. In addition, it is concluded that the pore size lower than 2 nm show an exponentially high interest in adsorbing the gas molecules at supercritical conditions. Finally, the results recommend that the simplified local density model gives promising estimates for converting excess adsorption data to absolute adsorption data and calculating the storage capacity of the reservoir rock. Using the outcomes of this study, millions of tons of carbon dioxide can be safely stored in carefully selected high-organic content rocks. The proposed method can also have some applications in predicting the hydrocarbon-in-place and production behavior in shale reservoirs with high organic carbon content.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!