Preferred Language
Articles
/
ijcpe-944
Different Development Scenarios to Increase the Production Rates for Fauqi Oil Field Southeastern Iraq
...Show More Authors

The Fauqi field is located about 50Km North-East Amara town in Missan providence in Iraq. Fauqi field has 1,640 MMbbl STOIIP, which lies partly in Iran. Oil is produced from both Mishrif and Asmari zones. Geologically, the Fauqi anticline straddles the Iraqi/Iranian border and is most probably segmented by several faults. There are several reasons leading to drilling horizontal wells rather than vertical wells. The most important parameter is increasing oil recovery, particularly from thin or tight reservoir permeability. The Fauqi oil field is regarded as a giant field with approximately more than 1 billion barrels of proven reserves, but it has recently experienced low production rate problems in many of its existing wells. This study will concentrate on analyzing the Asmari reservoir as the main production reservoir in this field for an oil gravity of 18 API. While, well (FQ-8) has been selected as a pilot well to verify different development scenarios that could be taken to increase the reservoir production rate. The results show that both drilling lateral sections and performing the stimulation process in some reservoir intervals yield positive results to increase good productivity with different percentages. The lateral sections occasionally gave higher productivity than the stimulation process by (2-3) times.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 15 2002
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Computer Program for Predicting Ultimate Strength of Structural Concrete Sections of General Shape
...Show More Authors

Publication Date
Wed Mar 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Corrosion Inhibition for Carbon Steel of Benzimidazole Derivatives Synthesized in Sulfuric Acid Solution
...Show More Authors

Synthesis three organic inhibitors for carbon steel corrosion: 2-(propylthio)-1H-benzo[d]imidazole (PTBI), 2-(allylthio)- 1H-benzo[d]imidazole (ATBI) and 2-(prop-2-ynylthio)-1H-benzo[d]imidazole (YTBI) were prepared from reaction of 2-mercapto benzimidazole with different alkyl halide. The melting point and TLC were used to confirm the purity of the inhibitors as well as using the [FTIR, 1H-NMR and 13C-NMR] for the identify structures. The synthesized inhibitors were examined by potentiostatic polarization measurement as corrosion inhibitors of carbon steel in acidic media [1M H2SO4 ].The polarization measurement results showed that the mixed type inhibitors. In addition, the efficiency of inhibitors (YTBI) were studied at different con

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Design of a PID-Lead Compensator for a Twin Rotor Aerodynamic System (TRAS)
...Show More Authors

This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the s-plane. This has the effect

... Show More
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Synthesis and Antibacterial Evaluation for Some New Schiff-bases Derived from P-aminoacetanilide
...Show More Authors

Derivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate  to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with app

... Show More
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Using Environmental Isotopes for Water Resources Evaluation in Altun Kopri Basin, NE Kirkuk
...Show More Authors

Recently, the environmental isotopes are adopted to figure out the hydrological processes, recharge areas, flow paths, groundwater origin and the interaction between different watery bodies. Currently, five samples of the rainwater have been collected since January to April 2012, as well as December 2011. Those sampling periods have highest amounts of precipitation events. Meantime, 25 samples of groundwater, 5 of the Lesser Zab River and 3 of overland flow have been picked up during the wet period. The dry sampling of groundwater and the Lesser Zab River has been achieved in summer 2011. The Local Meteoric Water Line lies between Global Meteoric Water Line (GMWL) and East Mediterranean Water Line (EMWL). The lowest, highest and

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref