Carbonate matrix stimulation technology has progressed tremendously in the last decade through creative laboratory research and novel fluid advancements. Still, existing methods for optimizing the stimulation of wells in vast carbonate reservoirs are inadequate. Consequently, oil and gas wells are stimulated routinely to expand production and maximize recovery. Matrix acidizing is extensively used because of its low cost and ability to restore the original productivity of damaged wells and provide additional production capacity. The Ahdeb oil field lacks studies in matrix acidizing; therefore, this work provided new information on limestone acidizing in the Mishrif reservoir. Moreover, several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly for the development of the Mishrif reservoir. Since the new core flooding system is built to operate safely and straightforwardly. This study introduced the results of Matrix acidizing experiments, covering the most recent developments in linear core flooding. High-permeability flow pathways are created, and a longer and wider wormhole was generated at a high acid injection rate (6.67 cc/min). The acid efficiency curve yielded the lowest pore volume injected at the breakthrough of the PV_(bt-opt) is 2.73 and the v_(i-opt)=0.6 cm/min; thus, the optimum injection rate that results in an optimal possible wormhole and the least quantity of acid being used for this reservoir is 2.16 cc/min. This research evaluated the impact of matrix acidizing treatment on acoustic characteristics, which studies show are lacking or have never been investigated previously. Furthermore, in the assessment of geomechanical rock properties and elastic and petrophysical parameters before and after acid injection, one of the new concepts discovered during the lab experiment observation of the acoustic waveform before and after acid treatment for the tested rock sample is that the initial arrival time before acid treatment is 21.6 microseconds, with a delay of 31.2 microseconds attributed to the wormhole channel and mineral disintegration. CT-Scan applications in matrix acidizing were investigated in this research; additionally, a 3D view of plug samples was constructed to represent the wormhole extension via CT-processing software. A license of Stimpro Stimulation Software has been used to validate the experimental work to the field scale, making it the most comprehensive instrument for planning and monitoring matrix acid treatment and utilizing actual data to provide a far better knowledge of the well's reaction, with methods that represent the reality of what is happening in the reservoir before, during, and after matrix acid treatments, through the post-treatment skin factor which is the most often utilized statistic for analyzing stimulation treatments and relies on the geometry of the wormholed zone. The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; matrix acid treatments can have their production behavior predicted or matched using the reservoir simulation and production analysis option, employing the numerical simulation license software Petrel (Schlumberger) and Rubis (KAPPA) to determine the efficacy of previous treatments and the economics associated with future treatments. The estimated oil gain volume and percentage for the Mi4 unit in Ad-12 using particularly skin value -3.97 computed from Stimpro software for real stimulation acid job, it is yield enhancement in production of oil gain volume 6154 barrels as well as 105% increase of gain percentage for three months after matrix acidizing.
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreThis research presents a new algorithm for classification the
shadow and water bodies for high-resolution satellite images (4-
meter) of Baghdad city, have been modulated the equations of the
color space components C1-C2-C3. Have been using the color space
component C3 (blue) for discriminating the shadow, and has been
used C1 (red) to detect the water bodies (river). The new technique
was successfully tested on many images of the Google earth and
Ikonos. Experimental results show that this algorithm effective to
detect all the types of the shadows with color, and also detects the
water bodies in another color. The benefit of this new technique to
discriminate between the shadows and water in fast Matlab pro
The Electric Discharge (EDM) method is a novel thermoelectric manufacturing technique in which materials are removed by a controlled spark erosion process between two electrodes immersed in a dielectric medium. Because of the difficulties of EDM, determining the optimum cutting parameters to improve cutting performance is extremely tough. As a result, optimizing operating parameters is a critical processing step, particularly for non-traditional machining process like EDM. Adequate selection of processing parameters for the EDM process does not provide ideal conditions, due to the unpredictable processing time required for a given function. Models of Multiple Regression and Genetic Algorithm are considered as effective methods for determ
... Show MoreThis study aims to analyze the spatial distribution of the epidemic spread and the role of the physical, social, and economic characteristics in this spreading. A geographically weighted regression (GWR) model was built within a GIS environment using infection data monitored by the Iraqi Ministry of Health records for 10 months from March to December 2020. The factors adopted in this model are the size of urban interaction areas and human gatherings, movement level and accessibility, and the volume of public services and facilities that attract people. The results show that it would be possible to deal with each administrative unit in proportion to its circumstances in light of the factors that appe
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
In this paper, a fixed point theorem of nonexpansive mapping is established to study the existence and sufficient conditions for the controllability of nonlinear fractional control systems in reflexive Banach spaces. The result so obtained have been modified and developed in arbitrary space having Opial’s condition by using fixed point theorem deals with nonexpansive mapping defined on a set has normal structure. An application is provided to show the effectiveness of the obtained result.