Surge pressure is supplemental pressure because of the movement of the pipes downward and the swab pressure is the pressure reduction as a result of the drill string's upward movement. Bottom hole pressure is reduced because of swabbing influence. An Investigation showed that the surge pressure has great importance for the circulation loss problem produced by unstable processes in the management pressure drilling (MPD) actions. Through Trip Margin there is an increase in the hydrostatic pressure of mud that compensates for the reduction of bottom pressure due to stop pumping and/or swabbing effect while pulling the pipe out of the hole. This overview shows suggested mathematical/numerical models for simulating surge pressure problems inside the wellbore with adjustable cross-section parts. The developed models require simple input data that may be gotten from the rig location. Pressure variations due to Swabs and surge has been a major concern in the oil industry for numerous years. If the pressure variations become moreover extraordinary, this leads to formation fracture, and formation influx principal to a kick. In the worst circumstances and situations that kick principal on the blowout and put crew life in hazard. By using theoretical investigation and experimental consequences, it established that the surge pressure is a function of the well depth, the drilling tools combination, the diameter of the wellbore, drilling mud properties, drilling pipe operation speed, and acceleration of the drill pipe movement, etc. This review focuses and investigates the essential theory and on software that computes the pressure variations in different flow conditions to predict surge and swab pressure values.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThe study aimed to prepare a nanocapsules formulation from the acetonic extract of Moringa oleifera leaves, using polymeric capsules, and test its toxicity against the third instar larvae of Culex pipiens mosquitoes. The leaf extract was prepared using acetone as a solvent, and the nano polymeric capsules were prepared using the synthetic polymer polyethylene glycol 4000. The results showed the successful preparation of nano polymeric capsules from the leaf extract, with an average particle size of 259.2 nm, and a nanocapsule diameter of 263.83 nm, as determined by DLS and SEM analysis, respectively. The toxicity results indicated that the nano polymeric capsules of the leaf extract exhibited higher mortality rates, reaching 97.6% a
... Show MoreBackground: Polycystic ovarian syndrome is a common endocrine disorder affecting 6-10% of women of reproductive age and the most common cause of anovulatory infertility.
Objective: The aim of the study was to compare the effectiveness, side effects and outcomes of step-up gonadotrophin protocol versus laparoscopic ovarian diathermy (LOD) in infertile patients with clomiphene citrate resistant polycystic ovary syndrome.
Methods: The sample included women who attended our infertility clinic at Al-Elwiya Maternity Teaching Hospital and Kamal Al-Samarraee for Infertility and IVF Hospital in Baghdad/ Iraq from November 2013 to November 2014. Eighty case
... Show MoreDrilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreВ статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции в иракской аудитории с привлечением компьютерных технологий. Статья посвящена использованию мультимедийных технологий и различных приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн
... Show MoreThe aim of this paper is to investigate the effects of Nd:YAG laser shock processing (LSP) on micro-hardness and surface roughness of 86400Cu-Zn alloy. X-ray fluorescence technique was used to analyze the chemical composition of this alloy. LSP treatment was performed with a Q-switched Nd: YAG laser with a wavelength of 1064 nm. The results show that laser shock processing can significantly increase. The micro-hardness and surface roughness of the LSP-treated sample. Vickers diamond indenter was used to measure the micro-hardness of all samples with different laser pulse energy and the different number of laser pulses. It is found that the metal hardness can be significantly increased to more than 80% by increasing the laser energy and t
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin