The term "tight reservoir" is commonly used to refer to reservoirs with low permeability. Tight oil reservoirs have caused worry owing to its considerable influence upon oil output throughout the petroleum sector. As a result of its low permeability, producing from tight reservoirs presents numerous challenges. Because of their low permeability, producing from tight reservoirs is faced with a variety of difficulties. The research aim is to performing hydraulic fracturing treatment in single vertical well in order to study the possibility of fracking in the Saady reservoir. Iraq's Halfaya oil field's Saady B reservoir is the most important tight reservoir. The diagnostic fracture injection test is determined for HF55using GOHFER software. Models for petrophysics and geology were calibrated using the diagnostic fracture injection test results after the petrophysical and geomechanical parameters of the rock have been determined. The HF55 vertical well, which penetrates the Saady reservoir, has well logs that have been used to evaluate the petrophysical and geomechanical parameters. These estimates have been supported by findings from the diagnostic fracture injection test through the utilization of standard equations and correlations. The findings of the diagnostic fracture injection test, often known as the diagnostic fracture injection test, are very compatible with the findings of the well logs. The diagnostic fracture injection test pre-falloff test event was examined to determine the instantaneous shut-in pressure and fracture gradient. In the meantime, Closure pressure, process zone stress, fracturing fluid efficiency, closure gradient, critical fissure opening pressure, storage correction factor, permeability, and pressure-dependent leak-off coefficient were all determined using the G function on plot. With the help of a specific software, the petrophysical and geomechanical properties of a single vertical well [HF55] was found. Saady B reservoir's upper and lower sections, along with it are therefore predicted to have the full range of petrophysical and geomechanical features. With the use of DFIT analysis, these features serve as the foundation for developing fracturing models.
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreIn this paper, the reliability and scheduling of maintenance of some medical devices were estimated by one variable, the time variable (failure times) on the assumption that the time variable for all devices has the same distribution as (Weibull distribution.
The method of estimating the distribution parameters for each device was the OLS method.
The main objective of this research is to determine the optimal time for preventive maintenance of medical devices. Two methods were adopted to estimate the optimal time of preventive maintenance. The first method depends on the maintenance schedule by relying on information on the cost of maintenance and the cost of stopping work and acc
... Show MoreAbstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show MoreBackground: Laser urinary stone lithotripsy is an established endourological modality. Ho:YAG(2100nm) laser have broadened the indications for ureteroscopic stone managements to include larger stone sizes throughout the whole urinary tract.
Purpose: To evaluate the effectiveness and safety of Holmium: YAG(2100nm) laser lithotripsy with a semirigid uretero scope for urinary stone calculi in a prospective cohort of 17 patients.
Patients and Methods: Holmium: YAG(2100nm) laser lithotripsy was performed with a semirigid ureteroscope in 17 patients from September 2016 to December 2016. Calculi were located in the lower ureter in 9 patients (52.9%), the midure
... Show MoreSentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show More