The electric submersible pump, also known as ESP, is a highly effective artificial lift method widely used in the oil industry due to its ability to deliver higher production rates compared to other artificial lift methods. In principle, ESP is a multistage centrifugal pump that converts kinetic energy into dynamic hydraulic pressure necessary to lift fluids at a higher rate with lower bottomhole pressure, especially in oil wells under certain bottomhole condition fluid, and reservoir characteristics. However, several factors and challenges can complicate the completion and optimum development of ESP deployed wells, which need to be addressed to optimize its performance by maximizing efficiency and minimizing costs and uncertainties. To analyze the performance of ESP deployed wells, the objective function must include various factors associated with fluids, reservoir inflow and outflow characteristics, and pump parameters. In particular, the inflow and outflow parameters include well configuration, and types of completion string (e.g. tubing sizes, and download completion hardware) while reservoir and fluid parameters include pressure, temperature, and PVT properties. Pump parameters include gas vacuum fraction, electrical and mechanical constraints, power requirements, cable requirements, downhole conditions, etc. Despite these challenges, ESPs' importance and efficiency necessitate an in-depth understanding of its origins and evolution over time, as well as the difficulties encountered in the oil industry. This paper aims to provide a comprehensive review of ESP's origin and development, including all prior studies that have influenced optimum development. The literature review is divided into four main sections: experimental investigations, numerical simulation studies, mechanical modeling, and in-depth studies on production optimization. By providing an in-depth analysis of previous work in each area, this paper aims to contribute to ongoing efforts to enhance ESPs' performance and efficiency in the oil industry.
Purpose/objective:
1 - To explain the financial impact of the activities and areas of human resources management and the adoption of the methodology for estimating costs on the basis of conduct and statement of how to assess costs and benefits of human resource activities.
2 - Measuring human capital, and its impact on the financial statements.
Design/methodology/approach:
Concentrated dimensions of the research paper's lack of financial statements prepared by the organizations for information mandated human resource its components of the three (attraction - development
... Show MoreFe, Co and Sb nanopowders were fruitfully prepared by electrical wire explosion method in Double distilled and de-ionized water (DDDW) media. The formation of iron, cobalt and antimony (FeCoSb) alloy nanopowder was monitored by X-ray diffraction. The x-ray diffraction pattern indicates that there are iron, cobalt and antimony peaks. Optical properties of this alloy nanoparticles were characterized by UV-Visible absorption spectra. The absorption peak position is shifted to the lower wavelengths when the current increases. That means the mean size of the nanoparticles controlled by changing the magnitude of the current. The surface morphological analysis is carried out by employing Scanning Electron Microscope (SEM). Particles with varies
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreWelcome to International Journal of Research in Social Sciences & Humanities (IJRSSH). It is an international refereed journal of Social Sciences, Humanities & Linguistics in English published quarterly, both print and online.
The antimicrobial activity of two naphthoquinone semicarbazone derivatives (Two newly synthesized compounds) have been studied by using tube — diluation and disc plate technique. The effect of those derivatives upon pathogenic microorganism iso-lated from specimen(urine iwounds,stool, swabs, throat ....etc) have been studied also in comparison with the antibiotics (amikacin,ampicillin, carbencillin, cephalothin, cefoxitin,clindamycin ,erythromycin,gentamycin,penicillin,tetracylin and tri-methoprim. It was shown that derivative(1) had more effective against micro organ-ism than derivative(11).
This paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers
Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More