Multilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been demonstrated. In order to conduct MTA, a combination of rate profiles derived from production data and transient rate and pressure measurements at multiple surface rates is necessary. Numerous experimental and analytic approaches to calculating multilayer characteristics, performance, and flow behavior in multilayer systems have emerged. This technology was implemented at the Zubair oil field in southern Iraq. In the last four years, the number of wells producing under saturation pressure has been increased in the Zubair oil field, particularly for the Mishrif and Zubair reservoirs. In the design of secondary and tertiary recovery, the study of the reservoir in the form of an individual layer to determine the pressure, permeability, and damage of each layer with commingled formation is important. This research describes previously available methods, factors that affect Multilayer Transient Analysis an economic indicator of Multilayer Transient Analysis and a case study
The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism .
As regional development, as a matter of course, poses a number of systemic, scientific and political problems. While the issue of development is primarily at the national level to the limits of World War II in the industrialized world and to the 1960s borders in most Third World countries, the increasing awareness of regional disparities has led to the regional issue Were taken into consideration in the early 1960s and 1970s in most industrialized and developing countries alike. The local issue was only introduced in the early 1980s. The awareness of regional disparities and the fact that the regions do not have the same potential and that some regions have the resources to enable them to develop, grow and develop, unlike other r
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe problem of dark matter in galaxies is still one of the most important unsolved problems in the contemporary extragalactic astronomy and cosmology. The existence of a significant dynamic difference between the visible mass and the conventional mass of galaxies firmly establishes observational result. In this paper an unconventional explanation will be tested as an alternative to the cold dark matter hypothesis; which is called the modified Newtonian dynamics (MOND).
In this paper covers the simulation of galactic evolutions; where the two hypotheses are tested via the rotation curves. N-body simulation was carried adopting different configuration lik
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More