Preferred Language
Articles
/
fRYAH4cBVTCNdQwChTjc
Experimental Study and Analysis of Matrix Acidizing for Mishrif Formation-Ahdeb Oil Field
...Show More Authors

Carbonate matrix stimulation technology has progressed tremendously in the last decade through creative laboratory research and novel fluid advancements. Still, existing methods for optimizing the stimulation of wells in vast carbonate reservoirs are inadequate. Consequently, oil and gas wells are stimulated routinely to expand production and maximize recovery. Matrix acidizing is extensively used because of its low cost and ability to restore the original productivity of damaged wells and provide additional production capacity. The Ahdeb oil field lacks studies in matrix acidizing; therefore, this work provided new information on limestone acidizing in the Mishrif reservoir. Moreover, several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly for the development of the Mishrif reservoir. Since the new core flooding system is built to operate safely and straightforwardly. This study introduced the results of Matrix acidizing experiments, covering the most recent developments in linear core flooding. High-permeability flow pathways are created, and a longer and wider wormhole was generated at a high acid injection rate (6.67 cc/min). The acid efficiency curve yielded the lowest pore volume injected at the breakthrough of the PV_(bt-opt) is 2.73 and the v_(i-opt)=0.6 cm/min; thus, the optimum injection rate that results in an optimal possible wormhole and the least quantity of acid being used for this reservoir is 2.16 cc/min. This research evaluated the impact of matrix acidizing treatment on acoustic characteristics, which studies show are lacking or have never been investigated previously. Furthermore, in the assessment of geomechanical rock properties and elastic and petrophysical parameters before and after acid injection, one of the new concepts discovered during the lab experiment observation of the acoustic waveform before and after acid treatment for the tested rock sample is that the initial arrival time before acid treatment is 21.6 microseconds, with a delay of 31.2 microseconds attributed to the wormhole channel and mineral disintegration. CT-Scan applications in matrix acidizing were investigated in this research; additionally, a 3D view of plug samples was constructed to represent the wormhole extension via CT-processing software. A license of Stimpro Stimulation Software has been used to validate the experimental work to the field scale, making it the most comprehensive instrument for planning and monitoring matrix acid treatment and utilizing actual data to provide a far better knowledge of the well's reaction, with methods that represent the reality of what is happening in the reservoir before, during, and after matrix acid treatments, through the post-treatment skin factor which is the most often utilized statistic for analyzing stimulation treatments and relies on the geometry of the wormholed zone. The acid treatment evaluated for the well AD-12, primarily for the zone Mi4; matrix acid treatments can have their production behavior predicted or matched using the reservoir simulation and production analysis option, employing the numerical simulation license software Petrel (Schlumberger) and Rubis (KAPPA) to determine the efficacy of previous treatments and the economics associated with future treatments. The estimated oil gain volume and percentage for the Mi4 unit in Ad-12 using particularly skin value -3.97 computed from Stimpro software for real stimulation acid job, it is yield enhancement in production of oil gain volume 6154 barrels as well as 105% increase of gain percentage for three months after matrix acidizing.

Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Implementing a Smart Low-Cost System for Diagnosing Bacteria in Women
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 22 2016
Journal Name
Brazilian Journal Of Physics
Alpha Decay Preformation Factors for Even–Even 280–316116 Superheavy Isotopes
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Russian foreign policy towards the Arab Gulf For the post-2001
...Show More Authors

The Russian foreign policy of the post-cold-war era faced dilemmas in the light of the international and regional realities of the disintegration of the Soviet Union and the formation of a new unipolar international order led by the United States of America. Thus, Russian foreign policy-making was divided over the nature of the foreign policy to be followed. The achievement of the Russian goals, especially as the objectives of Russian foreign policy have been set within the framework of trying to regain the status and leading role, as well as the establishment of some fundamental changes to be consistent with the new international situation of the post-one The Russian Federation has adopted in the sphere of its foreign policy to the vari

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An efficient method for stamps recognition using Haar wavelet sub-bands
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 17 2019
Journal Name
Aip Conference Proceedings
The interpolation effect on the spare sinogram for 3D image reconstruction
...Show More Authors

The effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (18)
Crossref (34)
Scopus Clarivate Crossref