The main objective of this study is to experimentally investigate the effect of the CMC polymeric drag reducer on the pressure drop occurred along the annulus of the wellbore in drilling operation and investigate the optimum polymer concentration that give the minimum pressure drop. A flow loop was designed for this purpose consist from 14 m long with transparent test section and differential pressure transmitter that allows to sense and measure the pressure losses along the test section. The results from the experimental work show that increasing in polymer concentration help to reduce the pressure drop in annulus and the optimum polymer concentration with the maximum drag reducing is 0.8 kg/m3. Also increasing in flow rate and corresponding fluid velocity in the gap of the annulus helped to reduce the pressure losses due to fluid flow.
The objective of the present work is to measuring the concentration of heavy elements (Pb, Cd, Zn, As) in Baghdad's soil city and indication to the probable sources of pollution as well as comparing the concentration of heavy elements with local and international ranges. The Sampling and analyzing conducted in the present work included ( 15 ) Samples from Baghdad city ( three samples for each location ).The rates of heavy elements in soil samples were as following:. Pb ( 67.5 ) ppm, Cd ( 4.11 ) ppm , Zn ( 77.9 ) ppm , As ( 4.64 ) ppm. According to the results, we find increasing in the concentrations of the heavy elements ( Pb, Cd, Zn ) in soils and decreasing in ( As ).We conclude that the main reason behind the in
... Show MoreAs the temperature of combustion gases is higher than the melting temperature of the turbine materials, cooling of turbine parts in a gas turbine engine is necessary for safe operation. Cooling methods investigated in this computational study included cooling flow losses. Film-cooling is one typically used cooling method whereby coolant is supplied through holes passage, in present study the holes placed along the camber line of the blade. The subject of this paper is to evaluate the heat transfer that occur on the holes of blade through different
blowing coolant rates. The cases of this study were performed in a low speed wind tunnel with two tip gap at small and large (0.03 and 0.09cm) and multiple coolant flow rates through the fil
Evaluating a reservoir to looking for hydrocarbon bearing zones, by determining the petrophysical properties in two wells of the Yamama Formation in Siba field using Schlumberger Techlog software. Three porosity logs were used to identify lithology using MN and MID cross plots. Shale volume were calculated using gamma ray log in well Sb-6ST1 and corrected gamma ray in well Sb-5B. Sonic log was used to calculate porosity in bad hole intervals while from density log at in-gauge intervals. Moreover, water saturation was computed from the modified Simandoux equation and compared to the Archie equation. Finally, Permeability was estimated using a flow zone indicator. The results show that the Yamama Formation is found to be mainly limest
... Show MoreGround water hydrochemical study in Yusufiyah depends upon (25) wells where major cations and anions were obtained as well as trace elements. The hydrochemical properties include the study of (pH, EC, TDS, and TH). The groundwater of the study area is odorless and colorless except the wells (13 and 16) with a salty taste due to the elevated (TDS) concentration in it, where the wells depth ranges between 7-20 meters. Depth of water in these wells was about 25-35 meters above sea level. Groundwater generally flows from east to west and from north east to south west. The resource of groundwater depends upon surface water. Physical specifications are measured in the water samples included temperature, color, taste, odor, pH, electrical condu
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More