A modified water injection technique has organized by this study to improve oil recovery of the Mishrif reservoirs using polymerized alkaline surfactant water (PAS-Water) injection. It is planned to modify the existing water injection technology, first to control and balance the hazardous troublemaker reservoir facies of fifty-micron pore sizes with over 500 millidarcies permeability, along with the non-troublemaker types of less than twenty micron pore sizes with 45 to 100 millidarcies permeability. Second to control Mishrif reservoirs rock-wettability. Special core analysis under reservoir conditions of 2250 psi and 90 °C has carried out on tens of standard core plugs with heterogeneous buildup, using the proposed renewal water flooding mechanism. The technique assures early PAS-water injection to delay the water-breakthrough from 0.045 – 0.151 pore volumes water injected with 8 – 25% oil recovery, into 0.15 – 0.268 pore volumes water injected with 18 to 32% improved oil recovery. As well as, crude oil-in-water divertor injection after breakthrough, within 0.3 to oil0.65 – 0.85-pore volume of water injected to decrease water cut 1 four 0 to 15%. The overall progress of the PAS-water injection has achieved residual oil mobility of 65%, and upgraded the 35 – 50% oil recovery range by less than three pore volume water injected with 20 – 60% water cut, compared with the same oil recovery range by more than ten pore volume water injected with around 70% water cut. The ultimate oil recovery improved by this technique is from 70% via more than 20 pore volume water injected with over 95% water cut by usual water injection, to 85 – 90% via 6.4 pore volume water injected with over 90% water cut by the modified water injection. The technique succeeded to lower the end-point mobility ratio to 1.5 from above five by usual water injection. It is highly recommended to use ten micron mesh filter at the main injection site and four or five micron mesh filter at the injector sites; to avoid more than 80% of the suspended particles and save as much as possible the overall reservoir facies from permeability damage.
The research aims to: Preparing rehabilitative exercises with accompanying tools to rehabilitate those with shoulder dislocation. Knowing the effect of rehabilitative exercises and accompanying aids in improving the muscular strength and motor range of those with dislocations in the shoulder joint. The two researchers used the experimental design with the same experimental group with the pre and post tests, so the researcher chose a sample appropriate to the nature of his research problem, its goals and its hypotheses, as a sample of the injured was chosen to remove the shoulder joint, who completed the treatment, who were not practicing sports, and those who went to the Physiotherapy Center at Al-Was
... Show MorePermeability is an essential parameter in reservoir characterization because it is determined hydrocarbon flow patterns and volume, for this reason, the need for accurate and inexpensive methods for predicting permeability is important. Predictive models of permeability become more attractive as a result.
A Mishrif reservoir in Iraq's southeast has been chosen, and the study is based on data from four wells that penetrate the Mishrif formation. This study discusses some methods for predicting permeability. The conventional method of developing a link between permeability and porosity is one of the strategies. The second technique uses flow units and a flow zone indicator (FZI) to predict the permeability of a rock mass u
... Show MoreTigris River is the lifeline that supplies a great part of Iraq with water from north to south. Throughout its entire length, the river is battered by various types of pollutants such as wastewater effluents from municipal, industrial, agricultural activities, and others. Hence, the water quality assessment of the Tigris River is crucial in ensuring that appropriate and adequate measures are taken to save the river from as much pollution as possible. In this study, six water treatment plants (WTPs) situated on the two-banks of the Tigris within Baghdad City were Al Karkh; Sharq Dijla; Al Wathba; Al Karama; Al Doura, and Al Wahda from northern Baghdad to its south, that selected to determine the removal efficiency of turbidity and
... Show MorePurpose: This study's objective is to assess this relationship in the context of the banking industry in Iraq. The human resources management practices (HRMPs) Theoretical framework: in this study included recruiting and selection, training and development, performance appraisal, compensation and reward to testing relationship HRMPs. Design/methodology/approach: in this study; We analysed by used a quantitative approach, and 246 employees were selected as a sample and given a questionnaire. The SPSS software was used to examine the data that were obtained from the questionnaire. Findings: The study's findings revealed a variety of hypotheses and conclusions, including the following: competitive advantage (CA) is positively impacted by
... Show MorePurpose: This study's objective is to assess this relationship in the context of the banking industry in Iraq. The human resources management practices (HRMPs) Theoretical framework: in this study included recruiting and selection, training and development, performance appraisal, compensation and reward to testing relationship HRMPs. Design/methodology/approach: in this study; We analysed by used a quantitative approach, and 246 employees were selected as a sample and given a questionnaire. The SPSS software was used to examine the data that were obtained from the questionnaire. Findings: The study's findings revealed a variety of hypotheses and conclusions, including the following: comp
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More