This paper presents a study of the application of gas lift (GL) to improve oil production in a Middle East field. The field has been experiencing a rapid decline in production due to a drop in reservoir pressure. GL is a widely used artificial lift technique that can be used to increase oil production by reducing the hydrostatic pressure in the wellbore. The study used a full field model to simulate the effects of GL on production. The model was run under different production scenarios, including different water cut and reservoir pressure values. The results showed that GL can significantly increase oil production under all scenarios. The study also found that most wells in the field will soon be closed due to high water cuts. However, the application of GL can keep these wells economically viable. The economic evaluation of the study showed that the optimum GL design is feasible and can significantly improve oil production. This suggests that GL is a promising technology for improving oil production in fields that are experiencing a decline in production. The study also provides a new approach to GL optimization using a genetic algorithm, which can be used to find the optimal GL design for a given field.
Crime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the natu
... Show MoreBegging is an ancient social phenomenon since the Man's creation. It was simple at its beginning to get a living and the family needed, but presently, this simple social phenomenon converted to a big phenomenon which controlled by competent groups away from the values and principles. Their doings are far from humanity representing by the cutting of a hand or a foot and facial distortion or removed eye as a way of attracting people's emotions to get material and incorporeal helps; these doings became a trade which is exchanged by slave traders. Furthermore, different illegal and greedy methods were followed as a way of blackmailing others; contrariwise other cases of begging are doing by a people who real poor and needy. In this case, the
... Show MoreThe personality characteristics of the Leader are considered one of the main elements to reach into business organizations entrepreneurship; and because of the development of the organizations of the continuous transformations as result of huge Competition in private High Education sector, there is a great need for Leaders characterized of certain personality capable of managing their organizations and can positively effect on them. Also these organizations' success to reach into entrepreneurship requires a main significant element that is (strategic flexibility) which is considered one of the important elements for success.
Accordingly, this research is trying to fin
... Show MoreThe issue of intellectual capital is a critical issue in the success and excellence of organizations, especially if it is linked to the management of customer experience, and because of the characteristic of the Iraqi environment, which affected all sectors, including the banking sector, it was important to discuss the types of intellectual capital and its relationship to the management of customer experience, especially when managers private banks, the importance of research lies in the linking of its variables to build the strategic capabilities of banks to achieve excellence and sustainability, it aims to diagnose the extent of interest in the types of intellectual capital and management of customer experience in the Iraqi ban
... Show MoreChurning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show MoreThe ratio of draft tube to reactor diameters is of decisive importance for the operation behavior of air lift loop reactors. The influence of draft tube geometry was investigated with respect to oxygen mass transfer and mixing time. The diameter ratio was varied between 0.33 and 0.80. The measurements were performed in two loop reactors with liquid capacities of 11.775 and 26.49 liters using aqueous with solutions of different coalescence behavior. The results show that there is no single diameter ratio which would produce most favorable conditions for the two process parameters. With respect to the more important requirements of aerobic cultures, i.e high oxygen mass transfer and efficient mixing, a diameter ratio between 0.5 and 0.6 is
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe main problem of this research is the delay of implementation of the investment plan projects for the period (2013-2016) and the weakness of the staff ability in the ministries and they don’t have the sufficient experience to carry out the implementation process.
Therefore, the research aims to evaluate the implementation of programs and projects of the investment plan in a manner consistent with the objectives set for them without any wasteful of efforts, time and money. And then identify the problems and obstacles to determine the deviations of the implementation of the specific for each sector according to the criteria of evaluation and the form of cost, quality, time and implementation.<
... Show MorePurpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show More