Stick-slip is kind of vibration which associated with drilling operation in around the bottom hole assembly (BHA) due to the small clearance between drill string & the open hole and due to the eccentric rotating of string. This research presents results of specific experimental study that was run by using two types of drilling mud (Fresh water Bentonite & Polymer), with/without Nanoparticle size materials of MgO in various ratios and computes the rheological properties of mud for each concentration [Yield point, plastic viscosity, Av, PH, filter loss (30 min), filter cake, Mud Cake Friction, Friction Factor]. These results then were used to find a clear effects of Nanoparticle drilling mud rheology on stick - slip strength by several perspectives through a special “Torque and Drag” software which simulate the torque amount expected on BHA during drilling a vertical well in different conditions using real drilling string design that usually used in Iraqi oil fields. Thus to mitigate or to prevent stick–slip and cure the sequence events that could happen to both of drilling string and the well, i.e. Bit/BHA wear, pipe sticking, borehole instability and low Rate of penetration. Our study concluded that there are good reduction in the torque from (2031lb-ft) to (1823lb-ft) using polymer mud and torque reduction from (4000lb-ft) to (3450lb-ft) using Fresh Water Bentonite, these results do not include any breaking in the satisfactory range of other mud rheology.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreTwo compounds,[2-amino-4-(4-nitro phenyl) 1,3-thiazole],(4) and [2-amino-4-(4-bromo phenyl) 1,3-thiazole],(5), were synthesized by refluxing thiourea (1) with each of para-ntiro and para-bomophanacyl bromides(2) and (3) respectively, in absolute methanol. Then, by reaction of [5] with 3,5-dinitrobenzoyl chloride in dimethylformamide (DMF) yielded (6) .On the other hand, reaction of (4) with chloroacetyl chloride in dry benzene afforded (7), which is upon treatment with thiourea in absolute methanol, af
... Show MoreThe objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political syste
... Show MoreIn this study the Sub family of Nomiinae Robertson,1904 (Hyminoptera: Halictidae) was revised There were five species registered in our investigation:
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThe interplay of species in a polluted environment is one of the most critical aspects of the ecosystem. This paper explores the dynamics of the two-species Lokta–Volterra competition model. According to the type I functional response, one species is affected by environmental pollution. Whilst the other degrades the toxin according to the type II functional response. All equilibrium points of the system are located, with their local and global stability being assessed. A numerical simulation examination is carried out to confirm the theoretical results. These results illustrate that competition and pollution can significantly change the coexistence and extinction of each species.
AZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
