Innovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high injection pressures, which make it difficult to inject acid into the reservoir formation; and (ii) only a few acid jobs have been successful in Ahdeb oil wells, while the bulk of the others has been unsuccessful. Based on an acid efficiency curve, an ideal gel acid (HCl 15%) injection rate for this reservoir was 2.16 cc/min. This injection rate produces an optimal wormhole and the least amount of acid utilized. The optimum pore volume to breakthrough in wormhole propagation was 2.73, and the optimal interstitial velocity in wormhole propagation was 0.6 cm/min. Researchers have developed new formulae to compute the skin factor in anisotropic carbonates generated from matrix acidizing for the first time. This experiment revealed the need to acidify the matrix at the optimal injection rate.
In this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic
... Show MoreA Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine (Arg) and glycine ( Gly) in arginine acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed metho
... Show MoreThis research prepared polymer blend contains from epoxy resin (Ep) and polyurethane
)Pu) as a matrix material of percentage (90 %) from epoxy and ) 10 (% polyurethane and
reinforced by PVC fibers and aluminum fibers two dimension knitted mat with fractional
volume(15 %), and study impact strength before and after reinforcing at temperatures of
(20,40,60(
o
CØŒand the results have shown that the reinforcing matrix materials by fibers
increased impact strength values that rise from(3.387kJ/m2) to (151.62kJ/m2) of composite
material (Ep+Pu+PVC(and thus ) Ep+Pu+PVC+Al.F) at last (Ep+Pu+Al.F (. following
composite material so that temperatures increase led to rise impact strength values except the
polymer
A range of macrocyclic dinuclear metal (II) dithiocarbamate-based complexes are reported. The preparation of complexes was accomplished from either mixing of the prepared ligand with a metal ion or through a template one-pot reaction. The preparation of the bisamine precursor was achieved through several synthetic steps. The free ligand; potassium 2,2'-(biphenyl-4,4'-diylbis(azanediyl))bis(1-chloro-2-oxoethane-2,1diyl)bis(cyclohexylcarbamodithioate) (L) was yielded from the addition of CS2 to a bis-amine precursor in KOH medium.A variety of analytical and physical methods were implemented to characterise ligand and its complexes. The analyses were based on spectroscopic techniques (FTIR, UV-Vis, mass spectroscopy and 1H, 13C-NMR sp
... Show MoreHCl is separated from HCl –H2SO4 solution by membrane distillation process(MD). The flat –sheet membranes made from polyvinylidene fluoride (PVDF) and polypropylene (pp.). Plate and frame these types of membrane where used in the process. The feed is a mixture of HCl and H2SO4 acids compositions depended on metals treated object.HCl concentration increased in the permeate during the process but sulfuric acid increased gradually in the feed .During the concentration of solution acids concentrations in the feed at the beginning were 50 g/dm3 of sulfuric acid and 50 g/dm3 of hydrochloric acid at 333K feed temperature the permeate flux was 71 dm
... Show MoreBackground: Atrioventricular nodal reentrant tachycardia (AVNRT) is the commonest regular supraventricular tachyarrhythmia. Ablation in the area of slow pathway (SP) has been successfully implemented in every day clinical electrophysiological practice for more than 20 years. Although the procedure is generally regarded as effective and safe, data on long-term effects and predictors of success or failure are incomplete.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More