Preferred Language
Articles
/
ijcpe-944
Different Development Scenarios to Increase the Production Rates for Fauqi Oil Field Southeastern Iraq
...Show More Authors

The Fauqi field is located about 50Km North-East Amara town in Missan providence in Iraq. Fauqi field has 1,640 MMbbl STOIIP, which lies partly in Iran. Oil is produced from both Mishrif and Asmari zones. Geologically, the Fauqi anticline straddles the Iraqi/Iranian border and is most probably segmented by several faults. There are several reasons leading to drilling horizontal wells rather than vertical wells. The most important parameter is increasing oil recovery, particularly from thin or tight reservoir permeability. The Fauqi oil field is regarded as a giant field with approximately more than 1 billion barrels of proven reserves, but it has recently experienced low production rate problems in many of its existing wells. This study will concentrate on analyzing the Asmari reservoir as the main production reservoir in this field for an oil gravity of 18 API. While, well (FQ-8) has been selected as a pilot well to verify different development scenarios that could be taken to increase the reservoir production rate. The results show that both drilling lateral sections and performing the stimulation process in some reservoir intervals yield positive results to increase good productivity with different percentages. The lateral sections occasionally gave higher productivity than the stimulation process by (2-3) times.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Calculating Parameters for Se and Tin Plasmas Produced by Pulsed Nd: YAG Laser
...Show More Authors

      In this study, the plasma formed by the preparation of Se and Tin (Sn) using a Nd: YAG laser with a wavelength of 1064 nm in air, which was then studied using the technique of optical emission spectrum, was presented (OES).The laser-induced plasma parameters such an electron temperature (Te) were identified using two-ratio methods, using Stark broadening methods to determine the density of electrons (ne). According to the findings, there is a correlation between the amount of laser energy that is applied and the increase in the emission intensity of the spectral lines. In the case of Se plasma, an increase in laser energy causes a rise in the temperature of the electrons. While increasing the temperature of the elec

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 27 2016
Journal Name
Mine Water Environ.
Dominant Mechanisms for Metal Removal from Acidic Aqueous Solutions by Cement Kiln Dust
...Show More Authors

Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 20 2018
Journal Name
Reporters, Markers, Dyes, Nanoparticles, And Molecular Probes For Biomedical Applications X
Dual-radiolabeled nanoparticle probes for depth-independent in vivo imaging of enzyme activation
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Sep 10 2020
Journal Name
Diyala Journal Of Engineering Sciences
Finite Element Analysis of Seepage for Hemrin Earth Dam Using Geo-Studio Software
...Show More Authors

Finite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Bayesian Estimation for Two Parameters of Gamma Distribution under Generalized Weighted Loss Function
...Show More Authors

This paper deals with, Bayesian estimation of the parameters of Gamma distribution under Generalized Weighted loss function, based on Gamma and Exponential priors for the shape and scale parameters, respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation. Based on Monte Carlo simulation method, those estimators are compared in terms of the mean squared errors (MSE’s).

Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Simulation of indoor solar illumination system for a library hall in Baghdad city
...Show More Authors

A concept of indoor solar illumination is described and simulated. The solar illumination system is composed of a tracking primary reflector, a selective secondary reflector, a visible light guide and a scattering solid glass tube fixture. Each part of the solar illumination system is optically suited and compatible with other parts to realize high efficiency. The simulation is conducted for Baghdad city for a library hall. Two major days over a year are chosen to investigate the illumination system for acceptable visible light level for reading hall. The two days are: summer solstice day and winter solstice day at 8:00 AM and 12:00 PM for each. Research results showed that the design of the solar system is achieved on the base of minimu

... Show More
View Publication Preview PDF
Crossref