Production logging is used to diagnose well production problems by evaluating the flow profile, entries of unwanted fluids and downhole flow regimes. Evaluating wells production performance can be easily induce from production logs through interpretation of production log data to provide velocity profile and contribution of each zone on total production. Production logging results supply information for reservoir modeling, provide data to optimize the productivity of existing wells and plan drilling and completion strategies for future wells. Production logging was carried out in a production oil well from Mishrif formation of West Qurna field, with the objective to determine the flow profile and fluid contributions from the perforations after the stimulation job. The measurements were made under shut-in and three choke sizes (60/64”, 46/64” and 32/64”) flowing conditions. Overall, the data quality is acceptable to generate a good analysis. From the flowing surveys, it was observed that just the intervals 2250-2285 m and 2335-2375 m are contributing to the total well production while the well was flowing through the chokes 60/64” and 46/64”. However, most production is coming from the interval 2250-2285 m for each choke. The flow profile changed with the 32/64”, the interval 2250-2285 remained producing but the interval 2335-2375 m started receiving fluid from the upper interval. This cross flow increased after the well was shut in. The temperature log shows a normal behavior while the well is flowing through the 60/64” and 46/64” chokes, but changes as result of the cross flow with the 32/64” choke and with the well shut in. From the capacitance readings and pseudo fluid density (density from differential pressure) only oil is being produced, and there is a static water column at the sump.
The purpose of this study is to investigate the research on artificial intelligence algorithms in football, specifically in relation to player performance prediction and injury prevention. To accomplish this goal, scholarly resources including Google Scholar, ResearchGate, Springer, and Scopus were used to provide a systematic examination of research done during the last ten years (2015–2025). Through a systematic procedure that included data collection, study selection based on predetermined criteria, categorisation based on AI applications in football, and assessment of major research problems, trends, and prospects, almost fifty papers were found and analysed. Summarising AI applications in football for performance and injury p
... Show MoreTHE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
GA Al Omran, AA Noaimi, Z Al Madfai, H Al Hamamy, Journal of the Faculty of Medicine Baghdad, 2012
The results of theoretical and experimental investigations carried out to study the effect of load and relative sliding speed on the abrasive wear behavior in drilling bit teeth surfaces of an insert tungsten carbide bit have been presented. Experimentally, an apparatus for abrasive wear tests conducted on the modified ASTM-G65 was modified and fabricated to facilitate loading and measurement of wear rate for the sand/ steel wheel abrasion test, which involves two cases of contact; first is at dry sand and second is under wet condition. These tests have been carried under varied operating parameters of normal load and sliding speed. A theoretical model based upon the Archard equation has been developed for predicting wear simulation by u
... Show MoreThe process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More
