A series of overbased magnesium fatty acids such as caprylate, caprate, laurate, myristate, palmitate, stearate and oleate) were synthesized by the reaction of the fatty acids with active – 60 magnesium oxide and carbon dioxide (CO2) gas at 60 oC in the presence of ammonia solution as catalyst, toluene / ethanol solvent mixture (9:1vol/vol) was added.
The prepared detergent additives were characterized by FTIR, 1HNMR and evaluated by blending each additive in various concentrations with medium lubricant oil fraction (60 stock) supplied by Iraqi Midland Refineries Company. The total base number (TBN, mg of KOH/g) was determined, and the results of TBN were treated by using two-way analysis of variance (ANOVA) test. It was found that the number of carbons in the fatty acid (C8-C18) used for overbased detergent preparation had slight effect on the TBN of the oil, while detergent concentrations (1-5% wt/wt) had a significant effect on the TBN of the blended oil.
The oxidation stability of the oil blends with 2% of overbased magnesium palmitate and overbased magnesium stearate detergents was evaluated, and the results showed that these blends gave higher oxidation stability compared with the blends with standard antioxidant supplied by Midland Refineries Company.
The remediation oil production by matrix acidizing method on the well named "X" (for confidential reasons) is scrutinized in this paper. Initial production of 1150 bpd, production index of 2.8 STB/Psi/d and permeability of 150md, in 2018 two years down the lane this dropped to 450 bpd, production index 0.7 STB/Psi/d. The declined observed on the production index is trouble shouted and after elimination of (no completion damage/perforation damage), the skin is calculated by carrying out a well test (build-up test) whose extrapolation in excel over times gave us a skin of 40.The reservoir heterogeneity, containing >20% of feldspar, carbonates and paraffin’s guided thematrix acidizing design and treatment proposition to remedy thi
... Show MoreStripping is one of the major distresses within asphalt concrete pavements caused due to penetration of water within the interface of asphalt-aggregate matrix. In this work, one grade of asphalt cement (40-50) was mixed with variable percentages of three types of additives (fly ash, fumed silica, and phosphogypsum) to obtained an modified asphalt cement to resist the effect of stripping phenomena .The specimens have been tested for physical properties according to AASHTO. The surface free energy has been measured by using two methods namely, the wilhelmy technique and the Sessile drop method according to NCHRP-104
procedures. Samples of asphalt concrete using different asphalt cement and modified asphalt cement percentages(4.1,4.6 an
Half of the oil production of the worldwide is a result of the water flooding project. But the main concern of this process is mobility control of the injected fluid, because the unfavorable mobility ratio leads to fingering effect. Adding polymer to the injection water increase the water viscosity, therefore, the displacement will be more stable and have a greater sweep efficiency.
Using of polymer flooding has received more attention these days. Polymer has great potential in the Middle East region, especially in reservoir with high temperature and salinity.
The main objective of this work is to show the effect of shear rate, salinity, temperature, polymer concentration on polymer v
... Show MoreMobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10
... Show MoreArtificial roughness applied to a Solar Air Heater (SAH) absorber plate is a popular technique for increasing its total thermal efficiency (ηt−th). In this paper, the influence of geometrical parameters of V-down ribs attached below the corrugated absorbing plate of a SAH on the ηt−th was examined. The impacts of key roughness parameters, including relative pitch p/e (6–12), relative height e/D (0.019–0.043), angles of attack α (30–75°), and Re (1000–20,000), were examined under real weather conditions. The SAH ηt−th roughened by V-down ribs was predicted using an in-house developed conjugate heat-transfer numerical model. The maximum SAH ηt−th was shown to be 78.8% as predicted under the steady-state condition
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show More