Acidizing is one of the most used stimulation techniques in the petroleum industry. Several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly in the development of the Mishrif reservoir, including the following: (1) high injection pressures make it difficult to inject acid into the reservoir formation, and (2) only a few acid jobs have been effective in Ahdeb oil wells, while the bulk of the others has been unsuccessful. The significant failure rate of oil well stimulation in this deposit necessitates more investigations. Thus, we carried out this experimental study to systematically investigate the influence of acid treatment on the geomechanical properties of Mi4 formation of the Mishrif reservoir. The acid core-flood experiments were performed on seven core samples from the oil reservoir in central Iraq. The porosity, permeability, acoustic velocities, rock strength, and dynamic elastic parameters were computed before and after the acidizing treatment. To determine the optimal acid injection rate, different injection flow rates were used in the core-flooding experiments. The propagation of an acid-induced wormhole and its effect on the rock properties were analyzed and compared to that of intact rocks. Computed tomography (CT) scan and a 3D reconstruction technique were also conducted to establish the size and geometry of the generated wormhole. To analyze the influence of mineralogical variation and heterogeneity and confirm the consistency of the outcomes, acidizing experiments on different rock samples were conducted. The results demonstrate that for all the rock samples studied, the mechanical properties exhibit rock weakening post-acid treatment. The Young’s modulus reduced by 26% to 37%, while the Poisson’s ratio, the coefficient of lateral earth pressure at rest, and the material index increased by 13% to 20%, 23% to 32%, and 28% to 125%, respectively. The CT scan visually confirmed that the acid treatment effectively creates a pathway for fluid flow through the core.
The elections of the Council of Representatives in Iraq are one of the manifestations of political participation, which makes it attracts the attention of researchers. Where Iraq witnessed in 2005 important political events in the Iraqi arena, a pluralist parliamentary elections or elections in Iraq by direct free election on January 30, the first almost half a century ago. On November 15 of the same year, Iraq adopted a permanent constitution for the country through a popular referendum.
The importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading role of organizations in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul. .
After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin
... Show MoreSol-gel method was use to prepare Ag-SiO2 nanoparticles. Crystal structure of the nanocomposite was investigated by means of X-ray diffraction patterns while the color intensity was evaluated by spectrophotometry. The morphology analysis using atomic force microscopy showed that the average grain sizes were in range (68.96-75.81 nm) for all samples. The characterization of Ag-SiO2 nanoparticles were investigated by using Scanning Electron Microscopy (SEM). Ag-SiO2 NPs are highly stable and have significant effect on both Gram positive and negative bacteria. Antibacterial properties of the nanocomposite were tested with the use of Staphylococcus aureus (S. aureus) and Escherichia coli (E. coli) bacteria. The results have shown antibacteri
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MorePositron annihilation lifetime has been utilized for the first time to investigate the free - volume hole properties in thermolumenscent dosimeter ( TLD ) as a function of gamma-dosc . The hole volume, free volume fraction determined form orthopsitronium lifetime are found to be ?lamatically increase to large values , and then to minimum values as a function ofgamma-dose . The free - volume holes size is found to be 0.163nm’ and to have maximum of 0.166nm^ at the gamma-dose of 0.1 and 0.8 Gy, respectively-
The current study aims at using non-hatchable artemia eggs of local origin and making use of these eggs by decapsulating and presenting them as food for the larvae of the Cyprinus carpio as a source of animal protein with high nutritional value instead of throwing them away. The results showed that the second parameter (A2) was highly significant at the level (P≤0.05) in the growth rates of the larvae that were fed on decapsulated artemia eggs alone, and it was better than the two control parameters (A1), in which the larvae were fed with feed designated for Cyprinus carpio fish. It also outperformed the third parameter (A3), in which the feed was mixed with artemia eggs with 50% decapsulation, which also outperformed the control paramete
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreBackground: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show More