Carbonate matrix stimulation technology has progressed tremendously in the last decade through creative laboratory research and novel fluid advancements. Still, existing methods for optimizing the stimulation of wells in vast carbonate reservoirs are inadequate. Consequently, oil and gas wells are stimulated routinely to expand production and maximize recovery. Matrix acidizing is extensively used because of its low cost and ability to restore the original productivity of damaged wells and provide additional production capacity. The Ahdeb oil field lacks studies in matrix acidizing; therefore, this work provided new information on limestone acidizing in the Mishrif reservoir. Moreover, several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly for the development of the Mishrif reservoir. Since the new core flooding system is built to operate safely and straightforwardly. This study introduced the results of Matrix acidizing experiments, covering the most recent developments in linear core flooding. High-permeability flow pathways are created, and a longer and wider wormhole was generated at a high acid injection rate (6.67 cc/min). The acid efficiency curve yielded the lowest pore volume injected at the breakthrough of the PV_(bt-opt) is 2.73 and the v_(i-opt)=0.6 cm/min; thus, the optimum injection rate that results in an optimal possible wormhole and the least quantity of acid being used for this reservoir is 2.16 cc/min. This research evaluated the impact of matrix acidizing treatment on acoustic characteristics, which studies show are lacking or have never been investigated previously. Furthermore, in the assessment of geomechanical rock properties and elastic and petrophysical parameters before and after acid injection, one of the new concepts discovered during the lab experiment observation of the acoustic waveform before and after acid treatment for the tested rock sample is that the initial arrival time before acid treatment is 21.6 microseconds, with a delay of 31.2 microseconds attributed to the wormhole channel and mineral disintegration. CT-Scan applications in matrix acidizing were investigated in this research; additionally, a 3D view of plug samples was constructed to represent the wormhole extension via CT-processing software. A license of Stimpro Stimulation Software has been used to validate the experimental work to the field scale, making it the most comprehensive instrument for planning and monitoring matrix acid treatment and utilizing actual data to provide a far better knowledge of the well's reaction, with methods that represent the reality of what is happening in the reservoir before, during, and after matrix acid treatments, through the post-treatment skin factor which is the most often utilized statistic for analyzing stimulation treatments and relies on the geometry of the wormholed zone. The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; matrix acid treatments can have their production behavior predicted or matched using the reservoir simulation and production analysis option, employing the numerical simulation license software Petrel (Schlumberger) and Rubis (KAPPA) to determine the efficacy of previous treatments and the economics associated with future treatments. The estimated oil gain volume and percentage for the Mi4 unit in Ad-12 using particularly skin value -3.97 computed from Stimpro software for real stimulation acid job, it is yield enhancement in production of oil gain volume 6154 barrels as well as 105% increase of gain percentage for three months after matrix acidizing.
The problem of finding the cyclic decomposition (c.d.) for the groups ), where prime upper than 9 is determined in this work. Also, we compute the Artin characters (A.ch.) and Artin indicator (A.ind.) for the same groups, we obtain that after computing the conjugacy classes, cyclic subgroups, the ordinary character table (o.ch.ta.) and the rational valued character table for each group.
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreSustainability is a major demand and need pursued by cities in all areas of life due to the environmental, social and economic gains they provide, especially in the field of city planning and urban renewal projects that aim to integrate the past, present and future.
The research aims to evaluate the Haifa Street renewal project, and Al-Shawaka district, one of the Baghdad districts located next to Al-Karkh, was elected by comparing the sustainability indicators of urban renewal with the reality of the situation through a field survey and questionnaire form and focusing on the social and economic impacts and environmental for the project on the study area. To reach the most important conclusions and recommendations
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreThis paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord
... Show MoreAbstract A descriptive study was carried out on nurses who were working at burn. Units in Baghdad city hospitals, Al-Kindy , Al-Yarmook, Al-Qadisiya, Al-karkh, and Al-Karama hospital, in the period from 20th july 2003 to 20th November 2003. The study aimed to identify the nurses performance about pain management for burned patients at burn units and find out the relationship between the demographic characteristics and performance . A purposive (non-probability) sample of (40) nurses, (24) male nurses and (16) female. The data were collected through the use of observational checklist, which comprised (
Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on
... Show MoreAbstract: E2F6 is a member of the E2F family of transcription factors involved in regulation of a wide variety of genes through both activation and repression. E2F6 has been reported as overexpressed in breast cancers but whether or not this is important for tumor development is unclear. We first checked E2F6 expression in tumor cDNAs and the protein level in a range of breast cancer cell lines. RNA interference-mediated depletion was then used to assess the importance of E2F6 expression in cell lines with regard to cell cycle profile using fluorescence-activated cell sorting and a cell survival assay using (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT). The overexpression of E2F6 was confirmed in breast tumor cDNA samp
... Show More