Well integrity is a vital feature that should be upheld into the lifespan of the well, and one constituent of which casing, necessity to be capable to endure all the interior and outside loads. The casing, through its two basic essentials: casing design and casing depth adjustment, are fundamental to a unique wellbore that plays an important role in well integrity. Casing set depths are determined based on fracturing pressure and pore pressure in the well and can usually be obtained from well-specific information. Based on the analyzes using the improved techniques in this study, the following special proposition can be projected: The selection of the first class and materials must be done correctly and accurately in accordance with the depth of casing preparation and the strategy in the considered field that must be taken into account definitely in the drilling and completion period, nevertheless correspondingly in production and upkeep, conversion to an injection well or the opposite, the plug in addition to the closing stage. Features that control the depth of the casing seat have been studied, which consist of fracture gradient, pore pressure with other issues are the surviving lithology's of rocks. Subsequently defining the casing seat can be sustained with an investigation of the determination of the suitable drilling fluid. According to the consequences of the fracture pressure and pore pressure investigation and the findings of casing setting depth by means of the bottom-up technique, the consequences are gotten to each casing for the 4 studied wells. reference point designed from the rotating table RT. For well A, the conductor casing depth is 47m, the casing surface depth is 533m, the intermediate casing setting depth is 1882 m. Finally, for the production casing depth is 3441 m. Compared to the collapse pressure method, it was found that the bottom-up method gave results that are close and similar to the real results. The results of other wells are included in the search consequences
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe current research seeks to achieve several objectives, including knowing the extent of the audit directorate of the Ministry of Construction, Housing and General Municipalities of the International Standard (ISO19011:2018) regarding determining the efficiency and evaluation of auditors and diagnosing the gap between requirements and application and knowing the reasons for not applying some of the items in the standard, starting from the problem, The field raised the following question (Does the audit directorate determine the efficiency and evaluation of auditors according to the standard ISO19011:2018?), and the importance of research lies in determining the return that can be achieved by the directorate through its application of stand
... Show More
The research aims to study the reliability of government institutions, including the audit directors, which are one of the most important oversight formations in the Ministry of Construction, Housing and Public Municipalities, on which the responsibility for comprehensive auditing of all the Ministry's (municipalities) formations falls on the Managing the Audit Program according to the specification (ISO 19011: 2018) to improve the audit performance which requires compliance with the application of the audit management system in accordance with the standard Specification (ISO 19011: 2018), depending on the methodology of the case study, and using of checklists, which were chosen ac
... Show MoreIn this paper , the CO2 laser receiver system is designed and studied, with wavelength laser 10.6 ?m in room temperature , and to evaluate the performance and discussion it via the package of optical design (ZEMAX), from its output the Spot Diagram is measured through RMS ,and from the Ray fan plot , the aberrations is found which is the normal error for the best focus named (under corrected ) , the other output was the Geometric Encircled Energy in the spot diagram . and found that the radius of spot diagram at 80% (R80%) from the total energy ,and focal shift .The designed system have high efficiency and low cost .
The purpose of the research is to present a proposed accounting system model for converting and aggregating accounting information within the framework of the differentiated accounting systems, and the research methodology consists of: The research problem is the existence of differentiated and dispersed accounting systems that operate within governmental economic units and at the same time seek to achieve a unified vision and goals for the organization, and the central research hypothesis is the possibility of conducting the process of conversion accounting information from the government accounting system to the unified accounting system, and then aggregate those systems. The research was conducted at the College of Administrat
... Show MoreIn this research a computational simulation has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev technique had been investigated as mirror trajectory with the aid of Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv
... Show MoreCarbonate matrix stimulation technology has progressed tremendously in the last decade through creative laboratory research and novel fluid advancements. Still, existing methods for optimizing the stimulation of wells in vast carbonate reservoirs are inadequate. Consequently, oil and gas wells are stimulated routinely to expand production and maximize recovery. Matrix acidizing is extensively used because of its low cost and ability to restore the original productivity of damaged wells and provide additional production capacity. The Ahdeb oil field lacks studies in matrix acidizing; therefore, this work provided new information on limestone acidizing in the Mishrif reservoir. Moreover, several reports have been issued on the difficulties en
... Show MoreThe extraction of Eucalyptus oil from Iraqi Eucalyptus Camadulensis leaves was studded using water distillation methods. The amount of Eucalyptus oil has been determined in a variety of extraction temperature and agitation speed. The effect of water to Eucalyptus leaves (solvent to solid) ratio and particle size of Eucalyptus leaves has been studied in order to evaluate the amount of Eucalyptus oil. The optimum experimental condition for the Eucalyptus oil extraction was established as follows: 100˚C extraction temperature, 200 rpm agitation speed; 0.5 cm leave particle size and 6:1 ml: g amount of water to eucalyptus leaves Ratio.