In many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relative permeability of five carbonate for core plugs from the Mishrif formation of WQ1. The relative permeability calculated by using Johnson, Bossler and Naumann (JBN) Correlation, which is, consider one of the unsteady-state approach where it found that the core plugs are water wet. A normalizing approach has been used to remove the effect of irreducible water and residual saturations, which would vary according on the environment. Based on their own irreducible water and trapped saturations, the relative permeabilities can subsequently be de-normalized and assigned to distinct sections (rock types) of the reservoir. The goal of this research is to normalize the relative permeability that was determined through water flooding.
The settlement rate and pore water pressure dissipation rate are mainly controlled by the permeability of soil. Both laboratory and field tests show that the permeability is varied during the loading and consolidation process. It is known that consolidation process is accompanied by decrease in void ratio which leads to decrease in the coefficient of permeability. The importance of the decrease of the coefficient of permeability on the time rate of settlement and pore water pressure needs to be investigated.
This paper takes into account the change in coefficient of permeability during consolidation and studies its effect on consolidation characteristics of a clay layer. The finite element method is used in the analysis and the packag
The Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin
... Show MoreThis paper is dealing with an experimental study to show the influence of the geometric characteristics of the vortex generators VG son the thickness of the boundary layer (∂) and drag coefficients (CD) of the flat plate. Vortex generators work effectively on medium and high angles of attack, since they are "hidden" under the boundary layer and practically ineffective at low angles.
The height of VGs relative to the thickness of the boundary layer enables us to study the efficacy of VGs in delaying boundary layer separation. The distance between two VGs also has an effect on the boundary layer if we take into
... Show MoreReduce the required time for measuring the permeability of clayey soils by using new manufactured cell
In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreA field experiment was conducted at the field of the Dept. of Field Crop Sci. / College of Agriculture / University of Baghdad . The objective was to determine the values of relative constant of three – way and double crosses of maize . Ten inbreds were used and crossed during spring and fall seasons of 2009 to produce three - way and double crosses , and ten hybrids were taken from each group . The ten hybrids were grown and selfed during spring 2010 to produce 2 seed . Three way and double crosses were sown with their parents and 2 seed during fall 2010 in RCBD with four replicates . Leaf area , total dry matter , row/ear , grain/ear , grain weight and grain weight/plant of hybrids , parents and 2 plants were taken . Results showed that
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show More