The Fauqi field is located about 50Km North-East Amara town in Missan providence in Iraq. Fauqi field has 1,640 MMbbl STOIIP, which lies partly in Iran. Oil is produced from both Mishrif and Asmari zones. Geologically, the Fauqi anticline straddles the Iraqi/Iranian border and is most probably segmented by several faults. There are several reasons leading to drilling horizontal wells rather than vertical wells. The most important parameter is increasing oil recovery, particularly from thin or tight reservoir permeability. The Fauqi oil field is regarded as a giant field with approximately more than 1 billion barrels of proven reserves, but it has recently experienced low production rate problems in many of its existing wells. This study will concentrate on analyzing the Asmari reservoir as the main production reservoir in this field for an oil gravity of 18 API. While, well (FQ-8) has been selected as a pilot well to verify different development scenarios that could be taken to increase the reservoir production rate. The results show that both drilling lateral sections and performing the stimulation process in some reservoir intervals yield positive results to increase good productivity with different percentages. The lateral sections occasionally gave higher productivity than the stimulation process by (2-3) times.
The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro
... Show MoreCorrosion Resistance Enhancement for low carbon steel is very important to extend its life service, the coating process is one of the methods which can using to achieve this, and it's the most important in surface treatments to improve the properties of metals and alloys surfaces such as corrosion resistance. In this work, low carbon steel was nitrided and coated with nano zinc using gas phase coating technical, to enhance the resistance of corrosion. The process included adding two layers. The first, a nitride layer, was added by precipitating nitrogen (N) gas, and the second, a zinc (Zn) layer, was added by precipitating Zn. The process of precipitating was carried out at different periods (5, 10, and 15 minutes). Scan electron mi
... Show MoreSolar hydrogen line emission has been observed at the frequency of 1.42 GHz (21 cm wavelength) with 3m radio telescope installed inside the University of Baghdad campus. Several measurements related to the sun have been conducted and computed from the radio telescope spectrometer. These measurements cover the solar brightness temperature, antenna temperature, solar radio flux, and the antenna gain of the radio telescope. The results demonstrate that the maximum antenna temperature, solar brightness temperature, and solar flux density are found to be 970 K, 49600K, and 70 SFU respectively. These results show perfect correlation with recent published studies.
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More