The gas-lift method is crucial for maintaining oil production, particularly from an established field when the natural energy of the reservoirs is depleted. To maximize oil production, a major field's gas injection rate must be distributed as efficiently as possible across its gas-lift network system. Common gas-lift optimization techniques may lose their effectiveness and become unable to replicate the gas-lift optimum in a large network system due to problems with multi-objective, multi-constrained & restricted gas injection rate distribution. The main objective of the research is to determine the possibility of using the genetic algorithm (GA) technique to achieve the optimum distribution for the continuous gas-lift injection flows in the structure of the network of Zubair, oil field with 10 gas-lift injected wells. This will be done through numerical simulation and modeling studies. The overall enhancement of the filed production rate is found to have increased from 15767 STB/day to 19847 STB/day. The well's reservoir pressure and water cut sensitivity studies are carried out to study the possible impacts of these elements upon the well and its efficiency through the course of the field. Our understanding of the potential benefits of utilizing gas lift techniques in a field from a technical and economical point of view is deepened by the use of examples from economic analysis. Furthermore, even though the idea of employing GA in this manner is not new, this work discusses GA-based optimization methodologies for increasing the oil production rate by using gas lifting in a Zubair oilfield. In order to assign gas injection rates to specific wells in a network throughout the field using limited gas injection rates, the model for optimization will be laid out step-by-step making it simple to understand and employ as a guide, especially for the front-line production technicians involved in the development and design of gas-lift systems.
Electro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu
... Show MoreA Laboratory study was conducted in quality control department ,state company for food stuff trading ministry of trade (2005-2006) on sunflower oil imported to Iraq from different origins included 12 trade marks, Complete random design was used with four replication .The purpose of the study is to know the origins effect on fatty acid percent and study the simple correlation between them, the result showed Turkish origin for trademark (Narin) was superior in Palmitic and Stearic fatty acid (10.41,3.29%).While Omanian origin for trademark Alsafwa was superior in Oleic(35.09%) and Syrian origin for trade mark Alnahraen was superior in Linoleic fatty acid percent 66.53% whereas Egyptian origin for trademark Alasel was superior in the percent
... Show MoreWater produced from power plants is one of the most important sources of water pollution, especially for areas like Baghdad, Contaminated industrial wastewater is a major environmental challenge due to the rapid growth of industries, leading to increased accumulation of harmful pollutants in water resources, the work is intended to study the impact of water generated from a power plant in the south on the level of heavy metals before and after the treatment process and after its discharge to the Tigris River. Objective is to determine the extent of heavy metals such as iron, copper, chromium, and zinc concentration in water extracted from various points and subsequently study the monthly variations of these elements with a view to assessmen
... Show MoreCoumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance