Multilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been demonstrated. In order to conduct MTA, a combination of rate profiles derived from production data and transient rate and pressure measurements at multiple surface rates is necessary. Numerous experimental and analytic approaches to calculating multilayer characteristics, performance, and flow behavior in multilayer systems have emerged. This technology was implemented at the Zubair oil field in southern Iraq. In the last four years, the number of wells producing under saturation pressure has been increased in the Zubair oil field, particularly for the Mishrif and Zubair reservoirs. In the design of secondary and tertiary recovery, the study of the reservoir in the form of an individual layer to determine the pressure, permeability, and damage of each layer with commingled formation is important. This research describes previously available methods, factors that affect Multilayer Transient Analysis an economic indicator of Multilayer Transient Analysis and a case study
In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreThe present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2020
The global health crisis resulting from the spread of the Corona virus, which the World Health Organization described on January 30, 2020 as a public health emergency of international concern, then returned to describe it as a pandemic on March 11, 2020, and the measures and procedures taken by government authorities in different countries of the world, whether at the highest level of imposing a comprehensive curfew or what is called globally home quarantine and thus disrupting all sectors and activities in the state, whether public or private (with the exception of some sectors such as the health, media and security sectors), or at a lower level than that, such as reducing work rates in different sectors by rates that vary from one country
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MorePorous silicon (P-Si) has been produced in this work by photoelectrochemical (PEC) etching process. The irradiation has been achieved using diode laser of (2 W) power and 810 nm wavelength. The influence of various irradiation times on the properties of P-Si material such as P-Si layer thickness, surface aspect, pore diameter and the thickness of walls between pores as well as porosity and etching rate was investigated by depending on the scanning electron micrograph (SEM) technique and gravimetric measurements.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More