The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates to surface conditions. Different types of Inflow Performance Relationship (IPR) equations can be used for SIP interpretation, including the Straight-line method, Fetkovitch method, and Laminar Internal Turbulent (LIT) relations. Although the SIP method can be used for single-phase flow, the interpreter can restrict the IPR’s calculations to a particular phase. This research discusses the difficulties in estimating the average reservoir pressure in multilayered reservoir completed wells over their production life. The SIP technique has been applied to some producing wells in the south of Iraq, which are completed in multiple producing reservoirs previously tested with a formation tester to estimate reservoir pressure and other parameters. Two wells are taken in the south of Iraq region, Zubair Oil Field, one with cross flow between perforations and the other well with no cross flow. An average pressure is not calculated for layer A in Well-1, because there is no contribution rate. While the average pressure for Well-1, layer B is 3414.49 psia. Also, the average pressure for Well-2, layer H is not calculated because there is no rate contribution from this layer, and the maximum average pressure was calculated in layer G, which is about 2606.26 psia. It is also found that the presence of cross flow has no effect on SIP calculations.
In the period after the collapse of the Soviet Union in 1991, the Federal Republic of Russia witnessed a setback in the overall strategic performance of the country, as it went through a stage of performance flop between the orientation towards Europe in the era of President Boris Yelsen (1991-1999), or the change of direction towards Eurasia, as the Russian Federation managed After President Vladimir Putin assumed power in 2000, from rebuilding the same state and preserving national unity and social cohesion, as well as building a phased military doctrine that made clear moves in Russian strategic thought and future directions towards regions of eternal importance in Russian strategic perception Lack of a set of motivations based on it:
... Show MoreThere have been many advances in the solar chimney power plant since 1930 and the first pilot work was built in Spain (Manzanares) that produced 50 KW. The solar chimney power plant is considered of a clean power generation that needs to be investigated to enhance the performance by studying the effect of changing the area of passage of air to enhance the velocity towards the chimney to maximize design velocity. In this experimental and numerical study, the reduction area of solar collector was investigated. The reduction area that mean changing the height of glass cover from the absorbing plate (h1=3.8cm, h2=2.6cm and h3=1.28cm). The numerical study was performed using ANSYS Fluent software package (version 14.0) to solve go
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreForeign direct investment has seen increasing interest worldwide, especially in developing economies. However, statistics have shown that Yemen received fluctuating FDI inflows during the period under study. Against this background, this research seeks to determine the relationship and impact of interest rates on FDI flows. The study also found other determinants that greatly affected FDI inflows in Yemen for the period 1990-2018. Study data collected from the World Bank and International Monetary Fund databases. It also ensured that the time series were made balanced and interconnected, and then the Auto Regressive Distributed Lag method used in the analysis. The results showed that the interest rates and
... Show MoreThe research aim to the usage educational method for jump shooting and it effect on speed strength in basketball for the specialist students in College Sport of Dayla University, which used the following statistic treatment (The T.test for compatible specimens), so after statistic treatment which appears theres a tow moral differences in speed strength and jump shooting tests results to (legs & arms) for the before and after tests, and after that the conclusions we positive and the second the special drills effect immaterial speed strength to legs and arms, so the tow researches recommended to looking after the best for educational methods that used in our sport colleges in Iraq.
The monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreOne of the main significant purposes of learning the English language is the need to have an effective communication allowing for exchange and transmitting information. As a basic form of human communication that allows people to connect, communicate, and share experiences with one another is writing skill. Through practicing trainable abilities like speaking, and writing, adaptation skills are required to overcome issues that develop in unfamiliar environments. Learners must be cognitively flexible to reconstruct and adjust to these situations' demands. This study aims at looking into the level of cognitive flexibility and writing abilities of Iraqi EFL university students. It also seeks to determine how these two variables are related. It
... Show MoreMultimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreThe auditor has a role in allocating joint costs in the gas industry, and the auditor's procedures are considered as systematic critical examination, analysis and evaluation of everything related to costs in general and joint costs in the gas industry in particular, with the aim of controlling the joint costs of gas industry products, and knowing the share of the cost of each product from the total industry costs Gas products reflect the reality of the company's performance by discovering weaknesses, defects and any errors, to ensure increased effectiveness and efficiency of the parties concerned with auditing them and imposing control and control over the company's resources, as well as
... Show More