The utilization of carbon dioxide (CO₂) to enhance wellbore injectivity presents a cost-effective and sustainable strategy for mitigating greenhouse gas emissions while improving reservoir performance. This study introduces an environmentally friendly method employing a water-soluble chitosan salt (CS) that generates a carbonated-rich acid solution upon contact with dry CO₂ at 25 °C and 508 psi. CS solutions (100–2000 ppm) were prepared and evaluated for CO₂ uptake, acid generation, and rheological behavior. Results show that 1000 ppm achieves an optimal CO2 uptake (2612 mg/l), with moderate viscosity increase (from 1.52 to 3.37 cp), while higher concentrations exhibit a sharp rise due to polymer-like network formation. Core flooding tests revealed that 1000 ppm CS maximized pore-volume-to-breakthrough time (PVBT) and produced uniform, less branched wormholes as observed via CT imaging, indicating efficient acid penetration with minimal interface reaction resistance. These findings suggest that chitosan-based formulations offer a promising and sustainable pathway for CO₂ utilization and improved reservoir stimulation.
An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi
... Show MoreThe Cu(II) was found using a quick and uncomplicated procedure that involved reacting it with a freshly synthesized ligand to create an orange complex that had an absorbance peak of 481.5 nm in an acidic solution. The best conditions for the formation of the complex were studied from the concentration of the ligand, medium, the eff ect of the addition sequence, the eff ect of temperature, and the time of complex formation. The results obtained are scatter plot extending from 0.1–9 ppm and a linear range from 0.1–7 ppm. Relative standard deviation (RSD%) for n = 8 is less than 0.5, recovery % (R%) within acceptable values, correlation coeffi cient (r) equal 0.9986, coeffi cient of determination (r2) equal to 0.9973, and percentage capita
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreHCl is separated from HCl –H2SO4 solution by membrane distillation process(MD). The flat –sheet membranes made from polyvinylidene fluoride (PVDF) and polypropylene (pp.). Plate and frame these types of membrane where used in the process. The feed is a mixture of HCl and H2SO4 acids compositions depended on metals treated object.HCl concentration increased in the permeate during the process but sulfuric acid increased gradually in the feed .During the concentration of solution acids concentrations in the feed at the beginning were 50 g/dm3 of sulfuric acid and 50 g/dm3 of hydrochloric acid at 333K feed temperature the permeate flux was 71 dm
... Show MoreAbstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreA concept of indoor solar illumination is described and simulated. The solar illumination system is composed of a tracking primary reflector, a selective secondary reflector, a visible light guide and a scattering solid glass tube fixture. Each part of the solar illumination system is optically suited and compatible with other parts to realize high efficiency. The simulation is conducted for Baghdad city for a library hall. Two major days over a year are chosen to investigate the illumination system for acceptable visible light level for reading hall. The two days are: summer solstice day and winter solstice day at 8:00 AM and 12:00 PM for each. Research results showed that the design of the solar system is achieved on the base of minimu
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More