Preferred Language
Articles
/
pRYzLIcBVTCNdQwCODtn
Increasing confidence in full field modelling and water flood planning for a giant reservoir under primary depletion through Material Balance modelling
...Show More Authors
Abstract<p>One of the principle inputs to project economics and all business decisions is a realistic production forecast and a practical and achievable development plan (i.e. waterflood). Particularly this becomes challenging in supergiant oil fields with medium to low lateral connectivity. The main objectives of the Production Forecast and feasibility study for water injection are:</p><p>1- Provide an overview of the total expected production profile, expected wells potential/spare capacity, water breakthrough timing and water cut development over time</p><p>2- Highlight the requirements to maintain performance, suggest the optimum development pattern</p><p>3- Increasing confidence in business decisions to develop the reservoir in question</p><p>The main tool used for these purposes is a sophisticated reservoir simulation software, namely CMG©, since it can predict reservoir behavior, honor physical constraints and capture the heterogeneity within the reservoir to accurately predict performance. However, the starting point for this kind of complicated studies needs to start from the basics, in order to understand the big picture and be able to plan properly for the scope to be delivered, hence, utilizing analytical tools like MBAL becomes quite necessary, if not crucial, to the success of full field modelling and choosing an optimum water flood pattern and design.</p><p>This paper covers the methodology for building the reservoir component utilizing a Material Balance model, of which the results will be used as an input to reservoir simulation to evaluate and accurately predict reservoir performance, which directly feeds into planning for water flooding projects and selection of an optimum flood pattern.</p><p>A Tank model was built at first to assess and understand the driving forces (energies) of the reservoir in question, utilizing pressure and production data from legacy wells, the prepared model is also supported by geological and petro physical studies to give representative results. Acquired Static Bottom Hole Pressures (SBHPs) in wells were used as anchor points for the tank pressure and to test the validity of the history match. Multiple analytical methods to QC the results and STOIIP volume were conducted, e.g. the Havlena-Odeh method.</p><p>This methodology has been tested successfully in the stated super giant oil field, in which the reservoir in question is a carbonate rock formation. An example of this is covered in the paper. It was concluded that utilizing a history matched and coherent MBAL model before conducting a detailed reservoir simulation study can save a lot of time and effort by providing guidance to the path which needs to be followed, and sheds light on the critical elements to be looked after. This has also helped to uncover the driving mechanisms and energies in the reservoir, hence allowing the engineer to plan for the necessary voidage replacement and water injection rates to sustain the reservoir pressure and pattern development. Another technical advantage of the described method is the higher sustainability of the model.</p><p>The suggested method, in combination with geological and petro physical information available, can be applied to majority of the reservoirs. This combination is paramount to ensure optimum time and planning that is followed for each reservoir development study that involves water flooding.</p>
Scopus Crossref
View Publication
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Aluminum Rubbish as a Coagulant for Oily Wastewater Treatment
...Show More Authors

In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
The Journal Of Immunology
AhR Activation Leads to Massive Mobilization of Myeloid-Derived Suppressor Cells with Immunosuppressive Activity through Regulation of CXCR2 and MicroRNA miR-150-5p and miR-543-3p That Target Anti-Inflammatory Genes
...Show More Authors
Abstract<p>The compound 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD), an environmental contaminant, is a potent ligand for aryl hydrocarbon receptor (AhR). In the current study, we made an exciting observation that naive C57BL/6 mice that were exposed i.p. to TCDD showed massive mobilization of myeloid-derived suppressor cells (MDSCs) in the peritoneal cavity. These MDSCs were highly immunosuppressive and attenuated Con A–induced hepatitis upon adoptive transfer. TCDD administration in naive mice also led to induction of several chemokines and cytokines in the peritoneal cavity and serum (CCL2, CCL3, CCL4, CCL11, CXCL1, CXCL2, CXCL5, CXCL9, G-CSF, GM-CSF, VEGF, and M-CSF) and chemokine receptors</p> ... Show More
View Publication Preview PDF
Scopus (82)
Crossref (81)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using the Artificial Gas Lift to Increase the Productivity of Noor Oil Field / Mishrif Formation
...Show More Authors

Noor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of  Missan Oil Company. The first two wells in the field were drilled in seventies and were  not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous  gas lift by using maximum production rate in the design.

   The design was made after comparing  the measured pressure with the calculated pressure, this comparison  show  that the method of Beggs-Brill and Petroleum Exper

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 29 2019
Journal Name
Journal Of The College Of Education For Women
Parenthetical Constructions in English and Arabic: A Contrastive Study
...Show More Authors

The present study attempts to give a detailed discussion and analysis of parenthetical constructions in English and Arabic, the aim being to pinpoint the points of similarity and difference between the two languages in this particular linguistic area.The study claims that various types of constructions in English and Arabic could be considered parenthetical; these include non-restrictive relative clauses, non-restrictive appositives, comment clauses, vocatives, interjections, among others. These are going to be identified, classified, and analyzed according to the Quirk grammar - the approach to grammatical description pioneered by Randolph Quirk and his associates, and published in a series of reference grammars during the 1970

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Idealism and Realism in The Design: A Comparative Study
...Show More Authors

At the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
Sound Assimilation in English and Arabic: a Contrastive Study
...Show More Authors

      This piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.

     The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t

... Show More
View Publication Preview PDF