Preferred Language
Articles
/
ijcpe-210
Using Different Surfactants to Increase Oil Recovery of Rumaila Field (Experimental Work)
...Show More Authors

Enhanced oil recovery is used in many mature oil reservoirs to increase the oil recovery factor. Surfactant flooding has recently gained interest again. To create micro emulsions at the interface between crude oil and water, surfactant flooding is the injection of surfactants (and co-surfactants) into the reservoir, thus achieving very low interfacial tension, which consequently assists mobilize the trapped oil.

In this study a flooding system, which has been  manufactured and described at high pressure. The flooding processes included oil, water and surfactants. 15 core holders has been prepared at first stage of the experiment and  filled with washed sand grains 80-500 mm and then packing the sand to obtain sand packs samples for experiment. It was found that the best rate for water injection was 1.2 PV. Productively, while the optimum injection rate was 1.0 PV economically.

The study observed that the cost of water injection in secondary recovery increased 700% when PV injected increased from 1.0 PV to 8.0 PV, while the recovery increased only about 8% (58.77 – 66.7%).

The effects of  concentration, salinity and temperature is also explored by examined many values of each parameter according to surface tension by using capillary rise method. It was found that the optimum conditions for surfactant flooding for sodium dodecyl sulfate (SDS) 0.01 molar for concentration, 5500 P.P.M for salinity and 70 °C for temperatures. These conditions was used  to all kinds of surfactants that have been used in this study.

The study results indicated that the best surfactant in both productively and economically was SDS with maximum recovery about 90% for each secondary and tertiary recovery and the optimum injection volume for all surfactants 1.2 PV .

Another 12 Core holders with fixed pore volume were prepared for the second stage of the experiment. At this stage the pore volume was approximately constant and the variation included different values of SDS concentrations (0.1 and 0.001 Molar) and different values of salinity (1000 P.P.M and 3000 P.P.M) and temperature equal to  90 °C. Each value for concentration was experimented with the two values of salinity which in result obtaining four flooding conditions. Each condition was flooded by three injection rates (50, 120, 200 %). The results proved the results obtained from the first stage.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 24 2020
Journal Name
Egyptian Journal Of Chemistry
Inhibition of Aluminum Alloy 7025 in Acid Solution Using Sulphamethoxazole
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Pore Structure Characterization of Shale Reservoir Using Nitrogen Adsorption-Desorption
...Show More Authors

This research paper aimed to quantitively characterize the pore structure of shale reservoirs. Six samples of Silurian shale from the Ahnet basin were selected for nitrogen adsorption-desorption analysis. Experimental findings showed that all the samples are mainly composed of mesopores with slit-like shaped pores, as well as the Barrett-Joyner-Halenda pore volume ranging from 0.014 to 0.046 cm3/ 100 g, where the lowest value has recorded in the AHTT-1 sample, whereas the highest one in AHTT-6, while the rest samples (AHTT-2, AHTT-3, AHTT-4, AHTT-5) have a similar average value of 0.03 cm3/ 100 g. Meanwhile, the surface area and pore size distribution were in the range of 3.8 to 11.1 m2 / g and 1.7 to 40 nm, respectively.

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Processing of Polymers Stress Relaxation Curves Using Machine Learning Methods
...Show More Authors

Currently, one of the topical areas of application of machine learning methods is the prediction of material characteristics. The aim of this work is to develop machine learning models for determining the rheological properties of polymers from experimental stress relaxation curves. The paper presents an overview of the main directions of metaheuristic approaches (local search, evolutionary algorithms) to solving combinatorial optimization problems. Metaheuristic algorithms for solving some important combinatorial optimization problems are described, with special emphasis on the construction of decision trees. A comparative analysis of algorithms for solving the regression problem in CatBoost Regressor has been carried out. The object of

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
To contribute in handling the housing crisis in the city of BaghdadA study for the decision of the Mayoralty of Baghdad to allow adding a third floor for the residential units
...Show More Authors

We need to know the basic facts concerning planning top and bottom limits including any critical levels or the threshold over which the cost would be much higher for land development. Therefore this paper concerned with Baghdad Municipality decision No.2/1004 dated 7/12/2004. The reason behind this decision is the hope to face up at least in the severe housing crisis in the city of Baghdad. This paper attempts to know the attitude of the local community in the general through a field study of people living near such dwelling where third floors are added of. This might indicate any positive or negative effects whether on short or long-term including its effect on the theoretical side including the population growth of Baghdad, the

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref