The productivity of oil wells may be improved by determining the value of enhancing well productivity and the likely reasons or sources of formation damage after the well has been recognized as underperforming. Oil well productivity may be improved, but the economics of this gradual improvement may be compromised. It is important to analyze the influence of the skin effect on the recovery of the reserve. The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; using a license of Stimpro Stimulation Software to validate the experimental work to the field scale, this software is considered the most comprehensive instrument for planning and monitoring matrix acid treatments and utilizing actual data to provide a far better knowledge of the well's reaction, with methods that represent the reality of what is happening in the reservoir before, during, and after matrix acid treatments, through the post-treatment skin factor, which is the most frequently utilized statistic for analyzing stimulation treatments and relies on the geometry of the wormholed zone. Referring to the previous buildup tests for Ad-12, the skin value of -3.97 is approximately identical to or slightly larger than the skin value estimated by the acid treatment simulation using Stimpro. Moreover, when the simulator was performed, the invading fluid revealed two distinct depths of investigation inside the treated zone. While the fluid invasion in the bottom area has invaded deeply at a distance of 95 inches despite the top layer wormhole penetrating to a depth of 32 inches.
In recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen
... Show MoreThe artistic mediation in theater connects the human elements with the material elements in the theatrical production process. The human artistic mediator plays a crucial role in achieving the artistic and expressive goals of the theatrical work, requiring high skills and expertise. Their role involves coordinating and executing the technical aspects of production, such as lighting, sound, set design, costumes, and acting, using their skills and techniques to transform the theatrical text into a successful stage performance. The artistic mediator significantly impacts the quality of the theatrical work and creates a distinct viewing experience for the audience. Technological advancements and continuous updates in theater contribute to th
... Show MoreThe topic of research (women and ideology in the feature film) is a series of researches addressed by the researcher on the subject of women in the feature film through studying the ideology as a thought and political system not only limited to the world of men, but women had a significant contribution in this area. The research identified the problem and its need as well as the objectives of the research and clarified its limits and importance. The research also identified the theoretical framework, which included the following axes: personality and ideology, film and ideology, then women and ideology in the film.
After the completion of the theoretical framework, the research concluded a set of indicators of the theoretic
... Show MoreA total 474 argasid ticks removed from 617 hosts including bats, rodents, and birds were found belong to four species of the genus Argos. One of which A. reflexus is reported for the first time for Iraq. Some informations regarding the infestation rate, intensity and some biological data are provided.
The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show MoreCrop coefficient for cherries was evaluated by measure the water consumption in Michigan State to find its variation with time as the plant growth. Crop coefficients value (Kc) for cherries were predicated by Michigan State University (MSU) and also by Food and Agriculture Organization (FAO) according to consume of water through the season. In this paper crop coefficients for cherries are modified accordingly to the actual measurements of soil moisture content. Actual evapotranspiration (consumptive use) were measured by the soil moisture readings using Time Domain Reflectometers (TDR), and compared with the actual potential evapotranspiration that calculated by using modified Penman-Monteith equation which depends on metrological statio
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MorePerhaps one of the most pillars in building communities, and to achieve consistency between its members, is the volunteer work, he is a humanitarian exercise been closely associated with all the meanings of goodness and righteousness since ancient times, but it differs in size and shape and motivations and trends from one community to another, and from time to time; while at least in the stages of calm and stability, it increases in disasters and calamities and wars times, and perhaps (the popular crowd) is the best proof of that, they answered a call reference, and volunteered to defend their land and their holy places. In terms of form it may be donating money or effort or profession or otherwise, either in terms of the trend may be di
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show More