Carbonate matrix stimulation technology has progressed tremendously in the last decade through creative laboratory research and novel fluid advancements. Still, existing methods for optimizing the stimulation of wells in vast carbonate reservoirs are inadequate. Consequently, oil and gas wells are stimulated routinely to expand production and maximize recovery. Matrix acidizing is extensively used because of its low cost and ability to restore the original productivity of damaged wells and provide additional production capacity. The Ahdeb oil field lacks studies in matrix acidizing; therefore, this work provided new information on limestone acidizing in the Mishrif reservoir. Moreover, several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly for the development of the Mishrif reservoir. Since the new core flooding system is built to operate safely and straightforwardly. This study introduced the results of Matrix acidizing experiments, covering the most recent developments in linear core flooding. High-permeability flow pathways are created, and a longer and wider wormhole was generated at a high acid injection rate (6.67 cc/min). The acid efficiency curve yielded the lowest pore volume injected at the breakthrough of the PV_(bt-opt) is 2.73 and the v_(i-opt)=0.6 cm/min; thus, the optimum injection rate that results in an optimal possible wormhole and the least quantity of acid being used for this reservoir is 2.16 cc/min. This research evaluated the impact of matrix acidizing treatment on acoustic characteristics, which studies show are lacking or have never been investigated previously. Furthermore, in the assessment of geomechanical rock properties and elastic and petrophysical parameters before and after acid injection, one of the new concepts discovered during the lab experiment observation of the acoustic waveform before and after acid treatment for the tested rock sample is that the initial arrival time before acid treatment is 21.6 microseconds, with a delay of 31.2 microseconds attributed to the wormhole channel and mineral disintegration. CT-Scan applications in matrix acidizing were investigated in this research; additionally, a 3D view of plug samples was constructed to represent the wormhole extension via CT-processing software. A license of Stimpro Stimulation Software has been used to validate the experimental work to the field scale, making it the most comprehensive instrument for planning and monitoring matrix acid treatment and utilizing actual data to provide a far better knowledge of the well's reaction, with methods that represent the reality of what is happening in the reservoir before, during, and after matrix acid treatments, through the post-treatment skin factor which is the most often utilized statistic for analyzing stimulation treatments and relies on the geometry of the wormholed zone. The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; matrix acid treatments can have their production behavior predicted or matched using the reservoir simulation and production analysis option, employing the numerical simulation license software Petrel (Schlumberger) and Rubis (KAPPA) to determine the efficacy of previous treatments and the economics associated with future treatments. The estimated oil gain volume and percentage for the Mi4 unit in Ad-12 using particularly skin value -3.97 computed from Stimpro software for real stimulation acid job, it is yield enhancement in production of oil gain volume 6154 barrels as well as 105% increase of gain percentage for three months after matrix acidizing.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreArab heritage have teem much of the literature value, written by evacuated, who had a legacy of linguistic great scientists, but the circumstances are unknown, did not write those books or authors emerge, chose to search for a book of those compositions, he did not write to him and his book emerge, fell hands a book (Altvsh in the language) to Abu Sufyan grammar, a fourth-century scientists, as it is Abu Sufyan grammar of scientists who rolled up the time their impact, and the cryptic revelations among the stars, preferring to stand on this book and its author, a statement of the most important grammatical aspects contained therein; to notch the curtain for this world, and his book (Altvsh in strewn language and Mnzawmha and express the
... Show MoreEmergency vehicle (EV) services save lives around the world. The necessary fast response of EVs requires minimising travel time. Preempting traffic signals can enable EVs to reach the desired location quickly. Most of the current research tries to decrease EV delays but neglects the resulting negative impacts of the preemption on other vehicles in the side roads. This paper proposes a dynamic preemption algorithm to control the traffic signal by adjusting some cycles to balance between the two critical goals: minimal delay for EVs with no stop, and a small additional delay to the vehicles on the side roads. This method is applicable to preempt traffic lights for EVs through an Intelli
A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreAspect categorisation and its utmost importance in the eld of Aspectbased Sentiment Analysis (ABSA) has encouraged researchers to improve topic model performance for modelling the aspects into categories. In general, a majority of its current methods implement parametric models requiring a pre-determined number of topics beforehand. However, this is not e ciently undertaken with unannotated text data as they lack any class label. Therefore, the current work presented a novel non-parametric model drawing a number of topics based on the semantic association present between opinion-targets (i.e., aspects) and their respective expressed sentiments. The model incorporated the Semantic Association Rules (SAR) into the Hierarchical Dirichlet Proce
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreNowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of
... Show More