Carbonate matrix stimulation technology has progressed tremendously in the last decade through creative laboratory research and novel fluid advancements. Still, existing methods for optimizing the stimulation of wells in vast carbonate reservoirs are inadequate. Consequently, oil and gas wells are stimulated routinely to expand production and maximize recovery. Matrix acidizing is extensively used because of its low cost and ability to restore the original productivity of damaged wells and provide additional production capacity. The Ahdeb oil field lacks studies in matrix acidizing; therefore, this work provided new information on limestone acidizing in the Mishrif reservoir. Moreover, several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly for the development of the Mishrif reservoir. Since the new core flooding system is built to operate safely and straightforwardly. This study introduced the results of Matrix acidizing experiments, covering the most recent developments in linear core flooding. High-permeability flow pathways are created, and a longer and wider wormhole was generated at a high acid injection rate (6.67 cc/min). The acid efficiency curve yielded the lowest pore volume injected at the breakthrough of the PV_(bt-opt) is 2.73 and the v_(i-opt)=0.6 cm/min; thus, the optimum injection rate that results in an optimal possible wormhole and the least quantity of acid being used for this reservoir is 2.16 cc/min. This research evaluated the impact of matrix acidizing treatment on acoustic characteristics, which studies show are lacking or have never been investigated previously. Furthermore, in the assessment of geomechanical rock properties and elastic and petrophysical parameters before and after acid injection, one of the new concepts discovered during the lab experiment observation of the acoustic waveform before and after acid treatment for the tested rock sample is that the initial arrival time before acid treatment is 21.6 microseconds, with a delay of 31.2 microseconds attributed to the wormhole channel and mineral disintegration. CT-Scan applications in matrix acidizing were investigated in this research; additionally, a 3D view of plug samples was constructed to represent the wormhole extension via CT-processing software. A license of Stimpro Stimulation Software has been used to validate the experimental work to the field scale, making it the most comprehensive instrument for planning and monitoring matrix acid treatment and utilizing actual data to provide a far better knowledge of the well's reaction, with methods that represent the reality of what is happening in the reservoir before, during, and after matrix acid treatments, through the post-treatment skin factor which is the most often utilized statistic for analyzing stimulation treatments and relies on the geometry of the wormholed zone. The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; matrix acid treatments can have their production behavior predicted or matched using the reservoir simulation and production analysis option, employing the numerical simulation license software Petrel (Schlumberger) and Rubis (KAPPA) to determine the efficacy of previous treatments and the economics associated with future treatments. The estimated oil gain volume and percentage for the Mi4 unit in Ad-12 using particularly skin value -3.97 computed from Stimpro software for real stimulation acid job, it is yield enhancement in production of oil gain volume 6154 barrels as well as 105% increase of gain percentage for three months after matrix acidizing.
Rock mechanical properties are critical parameters for many development techniques related to tight reservoirs, such as hydraulic fracturing design and detecting failure criteria in wellbore instability assessment. When direct measurements of mechanical properties are not available, it is helpful to find sufficient correlations to estimate these parameters. This study summarized experimentally derived correlations for estimating the shear velocity, Young's modulus, Poisson's ratio, and compressive strength. Also, a useful correlation is introduced to convert dynamic elastic properties from log data to static elastic properties. Most of the derived equations in this paper show good fitting to measured data, while some equations show scatters
... Show MoreIn this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
Background: Non-host-adapted Salmonella serovar Typhimurium is a facultative intracellular bacterium, which invades and multiplies within mononuclear phagocytes in liver, spleen, lymph nodes and Peyer’s plaques. Salmonella infection is a crucial medical and veterinary problem globally. S. Typhimurium causes various clinical symptoms, from asymptomatic infection to typhoid-like syndromes in infants or highly susceptible animals, for instance mice. Objective: The present study was carried out to investigate the efficacy of anthrax protective antigen (PA)as a potent adjuvant mixed with killed Salmonella Typhimurium (S.T.) to enhance the immunization capacity of the last. Materials and Methods: Two groups of mice were immunized with either th
... Show MoreIn the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational
... Show MoreThe use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 from Al-
... Show MoreThe study aimed at the following:
Identify the differences in average scores core thinking skills kindergarten children by variable sex (male - female), and by variable age (5.6 - 5.11).
To achieve this researcher adopted a standardized test of core thinking skills for the kindergarten children, which was built and standardization by the researcher Meyada Asaad Mussa 2012 . applied test on a sample of (814) ) boys and girls who were randomly chosen form, from directorates of Baghdad Education Adoption of the proportional distribution.
... Show More
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More