The instant global trend towards developing tight reservoir is great; however, development can be very challenging due to stress and geomechanical properties effect in horizontal well placement and hydraulic fracturing design. Many parameters are known to be important to determine the suitable layer for locating horizontal well such as petrophysical and geomechanical properties. In the present study, permeability sensitivity to stress is also considered in the best layer selection for well placement. The permeability sensitivity to the stress of the layers was investigated using measurements of 27 core sample at different confining stress values. 1-D mechanical earth model (MEM) was built and converted to a 3-D full-field geomechanical model to reach perfect layer choice. The analysis of results has diagnosed the maximum horizontal stress direction of NE-SW as determined using both Fullbore Formation Micro Imager FMI and sonic scanner anisotropy analysis. The effect of porosity and permeability compaction as a result of stress changes while reservoir depletion is including on the reservoir simulation model. The choice of best layer and optimum design criteria for hydraulic fracturing is done in the current study using a compaction simulation model with the results of available measurements of geomechanical properties. The results of the simulation model show that the formation sensitivity to stress is an important factor for detecting a suitable layer for horizontal wells placement. The results of MEM indicate that horizontal stress difference (Δσ) and unconfined compressive strength (UCS) are the most important factors among geomechanical parameters affected the layer selection. From simulation results, it was found that 225 to 275 m fracture half-length gives a higher increment in oil production. The optimum number of fracture stages is noticed to be 8 to 10 stages after which the increment in production will reduce.
Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreProgression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreFeline calicivirus (FCV) is a highly contagious virus that causes a mild to severe respiratory infection and oral disease in cats. It is especially common in shelters and breeding colonies, and often infects young cats, this study contained 50 different cats and samples were collected from September 2020 to January 2021. Samples taken by swabs from oropharyngeal and conjunctival area depending on the lesion of FCV infection to investigate viral nucleic acid from collected swabs, then extracting RNA from the swabs and converting it to a cDNA molecule, and last detecting the open reading template gene 2 using specific primer, these samples isolated from veterinary clinics, and shelters, all samples were collected from Baghdad city .Ra
... Show MoreThe aim of the research was to prepare Pilates exercises using the barrel ladder apparatus and to identify the effect of Pilates exercises on agility, coordination, and motor sequences of third-year female students in artistic gymnastics. The researcher adopted the experimental method to achieve the objectives of the study and to verify its hypotheses, as it is suitable for the nature and problem of the research. In selecting the research population, the researcher carefully chose the sample using a purposive method, clarifying its elements and constituent units. The research population consisted of third-year female students at the College of Physical Education and Sports Sciences for Women / University of Baghdad, with a total of 20 stud
... Show MoreThis research deals with leverage and its impact on the profitability of Islamic banks in Iraq for the years (2015-2018), the research variables of leverage have been analyzed and measured as an independent variable, profitability as a dependent variable, and the research is based on a main hypothesis: there is a moral relationship of statistical significance. Between leverage and profitability at The Islamic Cooperation Bank for the period (2015-2018). The results of the research showed that there are moral (exorcist) relationships between the ratio of leverage and profitability indicators, as the higher the leverage ratio, the higher the profitability indicators. In addition, The Islamic Cooperation Bank has adopted a conservative poli
... Show MoreThe subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables