Innovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high injection pressures, which make it difficult to inject acid into the reservoir formation; and (ii) only a few acid jobs have been successful in Ahdeb oil wells, while the bulk of the others has been unsuccessful. Based on an acid efficiency curve, an ideal gel acid (HCl 15%) injection rate for this reservoir was 2.16 cc/min. This injection rate produces an optimal wormhole and the least amount of acid utilized. The optimum pore volume to breakthrough in wormhole propagation was 2.73, and the optimal interstitial velocity in wormhole propagation was 0.6 cm/min. Researchers have developed new formulae to compute the skin factor in anisotropic carbonates generated from matrix acidizing for the first time. This experiment revealed the need to acidify the matrix at the optimal injection rate.
Mercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)
... Show MoreThis research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermor
... Show MoreBorrowing in linguistics refers to the process whereby a group of speakers incorporates certain foreign linguistic components into their home language via a process known as linguistic borrowing. The process by which these foreign linguistic elements, known as loanwords, go through phonological, morphological, or semantic changes in order for them to fit the grammar of the recipient language is referred to as loanword adaptation. Loanwords go through these changes in order for them to become compatible with the grammar of the recipient language. One of the most divisive topics in loanword phonology is whether adaptations occur at the phonemic or phonetic levels, and current literature distinguishes three primary viewpoints: nativiza
... Show MoreIt is no secret to anyone the lofty classifications and wonderful investigations made by Muslim scholars in various eras, with which they removed the dust of ignorance from the nation, clarified the argument, and illuminated the path of education, especially in the legal sciences, which are the foundation of religion.
It is the life of hearts and the path of grammarians in this world and the hereafter.
Among those scientific classifications are the investigations they have written in the science of the principles of legislation, which have established the general evidence and the original rules to which practical legal rulings are referred. And as you know, it is the basis of Islamic jurisprudence, a means of knowing its
... Show MoreIn this study, flow-based routing model is investigated. The aim of this study is to increase scalability of flow control, routing and network resources solutions, as well as to improve Quality of Service and performance of the whole system. A method of hierarchical routing is proposed. The goal coordination method alsoused in this paper. Two routing models (model with quadratic objective function and model with traffic engineering) were fully analyzed. The basic functions of the hierarchical routing model levels based on goal coordination method were addressed Both models’ convergence is also explained. The dependence of the coordination iterations number on the packet flow rates for both models is graphically shown. The results shows
... Show MoreThe region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled
... Show MoreThe survival analysis is one of the modern methods of analysis that is based on the fact that the dependent variable represents time until the event concerned in the study. There are many survival models that deal with the impact of explanatory factors on the likelihood of survival, including the models proposed by the world, David Cox, one of the most important and common models of survival, where it consists of two functions, one of which is a parametric function that does not depend on the survival time and the other a nonparametric function that depends on times of survival, which the Cox model is defined as a semi parametric model, The set of parametric models that depend on the time-to-event distribution parameters such as
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More