Carbon dioxide (CO2) flooding is an EOR technique in which carbon dioxide is injected into the reservoir to improve the oil recovery. The reservoir oil and rock properties are altered when carbon dioxide interacts with the oil and rock present in the reservoir. Carbon dioxide injection alters the oil and rock properties by causing reduction in oil viscosity, oil swelling and wettability alteration of the rock. This paper will present a proposal to study the wettability alteration in carbonate formations during miscible carbon dioxide flooding. In miscible carbon dioxide flooding, the injection pressure of carbon dioxide would be kept above the minimum miscibility pressure. Thus carbon dioxide is miscible with the oil present in the reservoir. This paper primarily focuses on understanding the effect of crude oil composition on the change in wettability and asphaltene precipitation in carbonate rocks during miscible carbon dioxide flooding. Experiments will be carried out with different crude oils (Heavy, Medium and Light) on the same carbonate rock, at reservoir conditions, in order to observe the change in rock wettability. Interaction between formation and asphaltene would be investigated by measuring precipitation quantitiy into production recovery and rock at constant CO2 reservoir pressure. Carbonate rocks are very special due to the fact that usually carbonate rocks are oil wet and carbon dioxide tends to change the wettability of the carbonate rocks from oil wet to water wet. This change in wettability of the reservoir rock increases the oil recovery. Literature review revealed that considerable amount of research has not been done on the wettability alteration of carbonate rocks during miscible CO2 flooding process. Thus this topic needs to be further investigated and studied.
In this work, measurements of activity concentration of naturally occurring radioactive materials (NORM) isotopes and their related hazard indices for several materials such as crude oil, sludge and water in Ahdeb oil fields in Waste governorate using high pure germanium coaxial detection technique. The average values for crude oil samples were174.72Bq/l, 43.46Bq/l, 355.07Bq/l, 264.21Bq/l, 122.52nGy/h, 0.7138, 1.1861, 0.601 mSv/y, 0.1503mSv/y and 1.8361 for Ra-226, Ac-228, K-40, Ra eq, D, H-external and H-internal respectively. According to the results; the ratio between 238U to 232Th was 4, which represents the natural ratio in the crust earth; therefore, one can be strongly suggested that the geo-stricture of the
... Show MoreThis research includes synthesis of new 5-Nitro isatin derivatives starting from 5-Nitro-3-(ethyl imino acetate)-2-oxo indole (1) namely 5-nitro-3-[(imino acetyl) semicarbazide]-2-oxo indole (2); 5-nitro-3-[(imino acetyl) phenylsemicarbazide]-2-oxo indole (3); 5-nitro-3-[(imino acetyl) thiosemicarbazide]-2-oxo indole (4); 5-nitro-3-[(iminoacetyl) phenylthiosemi carbazide]-2-oxo indole (5); 5-nitro-3-[(methyl imino)-4H-1, 2, 4-triazol-5-ol-3-yl]-2-oxo indole (6); 5-nitro-3-[(methyl imino) 4-phenyl-1, 2, 4-triazol-5-ol-3-yl]-2-oxo indole (7); 5-nitro-3-[(methyl imino) 4-phenyl-1, 2, 4-triazol-5-thiol-3-yl]-2-oxo indole (8) and 5-nitro-3-[(methyl imino) 4H-1, 2, 4-triazol-5-thiol-3-yl]-2-oxo indole (9). The derivatives were characterized us
... Show MoreThe synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib
... Show MoreMethotrxate (MTX) has become the standard of care and first-line therapy for patients who have RA and consider as a gold standard of treatment for RA. The role of MTX in the treatment of RA has now been well established. The use of MTX treatment of RA inhibits proliferation of the lymphocytes, reduces signs and symptoms this disease, reduces progression damage of the joints and improves quality of life outcome. Progranulin (PGRN) acts a role in autoimmune inflammatory, has important function in several processes including immune response. Present study has conducted to find the effect of MTX drugs as a therapeutic target for RA patients because of its ability to bind with tumor necrosis factor receptor (TNFR), with progranulin, obestatin an
... Show MoreAtotal of 551 water samples drinking( five Water Treatment Plans (WTPs) and raw water( from different sites on Tigris river) were collected.According to morphological characteristics and a set of biochemical tests, one hundred twenty eight of Aeromonas spp isolates were obtained In this study The percentages of Aeromonas recovery from river water was 72.52%, from wells water was (35%).Total percentage of positive aeromonas samples of treated water(Filtration &chlorine tank, supply water of WTPs, distribution system, reserviores and other samples not related to WPTs) was 8.8%.Count of Aeromonas in positive aeromonas samples ranging from 1 to 175 cfu 100 ml.
The results showed that generally no significant correlation between presen
Research Summary
The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.
Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.
On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MorePraise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More