Tight reservoirs have attracted the interest of the oil industry in recent years according to its significant impact on the global oil product. Several challenges are present when producing from these reservoirs due to its low to extra low permeability and very narrow pore throat radius. Development strategy selection for these reservoirs such as horizontal well placement, hydraulic fracture design, well completion, and smart production program, wellbore stability all need accurate characterizations of geomechanical parameters for these reservoirs. Geomechanical properties, including uniaxial compressive strength (UCS), static Young’s modulus (Es), and Poisson’s ratio (υs), were measured experimentally using both static and dynamic methods. Measured mechanical parameters on cores are used to correct well logs derived mechanical earth model (MEM). The analysis of measured mechanical properties of samples was conducted using the knowledge of cores mineralogy which was done in this study by the X-Ray Diffraction (XRD) test in addition to rock texture which was obtained using scanning electronic microscope (SEM). The study of SEM and TS of the samples explain the presence of vugges in some samples that cause its initial high porosity and consequently low UCS, also it causes lower compressional and shear velocity at these samples as compared to others. The minerals contained in each sample give a descriptive analysis of the difference of the values of both static and dynamic measured mechanical properties such as ultrasonic pulse traveling time, elastic properties, and UCS; this was explained through XRD results.
A fixed callus weight of 150 mg was induced from immature embryos of three bread wheat Triticum aestivum L. genotypes (Tamos 2, El-izz and Mutant 1) cultured on nutrient medium {MS) containing Polyethylene glycol (PEG-6000) supplemented with concentrations (0.0, 3.0, 6.0, 9.0 or 12.0%) to evaluate their tolerance to water stress. Cultures were incubated in darkness at temperature of 25?1 ?C. Callus fresh and dry weights were recorded and soluble Carbohydrate and the amino acid Proline concentrations were determined. Results showed that there were significant differences in studied parameters among bread wheat genotypes of which Tamos 2 was higher in callus average fresh and dry weights which gave 353.33 and 38.46 mg/cultured tube respecti
... Show MoreThe CO2-Assisted Gravity Drainage process (GAGD) has been introduced to become one of the mostinfluential process to enhance oil recovery (EOR) methods in both secondary and tertiary recovery through immiscibleand miscible mode. Its advantages came from the ability of this process to provide gravity-stable oil displacement forenhancing oil recovery. Vertical injectors for CO2 gas have been placed at the crest of the pay zone to form a gas capwhich drain the oil towards the horizontal producing oil wells located above the oil-water-contact. The advantage ofhorizontal well is to provide big drainage area and small pressure drawdown due to the long penetration. Manysimulation and physical models of CO2-AGD process have been implemented
... Show MoreHorizontal wells have revolutionized hydrocarbon production by enhancing recovery efficiency and reducing environmental impact. This paper presents an enhanced Black Oil Model simulator, written in Visual Basic, for three-dimensional two-phase (oil and water) flow through porous media. Unlike most existing tools, this simulator is customized for horizontal well modeling and calibrated using extensive historical data from the South Rumaila Oilfield, Iraq. The simulator first achieves a strong match with historical pressure data (1954–2004) using vertical wells, with an average deviation of less than 5% from observed pressures, and is then applied to forecast the performance of hypothetical horizontal wells (2008–2011). The result
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreMandali Dam is one of the small dams in Iraq; it is located on Haran Wadi, Gangir, just 3km north-east Mandali City. Mandali dam consists of four main parts, the dam body, the intake structure, the spillway, and the bottom outlet. The dam body is zoned earth filled with a central core. The main purposes of the dam are to maintain flow of Wadi Haran, supplying irrigation and drinking water to Mandali City, and recharging the groundwater. Over a period of seven years of operation, the dam lost its ability to store water due to accumulated sediments within its reservoir. The accumulated sediment is about 2.25million m3. The average annual rate of reduction during this period is about 0.321
... Show MoreThis paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreIsobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo
... Show More