Increasing hydrocarbon recovery from tight reservoirs is an essential goal of oil industry in the recent years. Building real dynamic simulation models and selecting and designing suitable development strategies for such reservoirs need basically to construct accurate structural static model construction. The uncertainties in building 3-D reservoir models are a real challenge for such micro to nano pore scale structure. Based on data from 24 wells distributed throughout the Sadi tight formation. An application of building a 3-D static model for a tight limestone oil reservoir in Iraq is presented in this study. The most common uncertainties confronted while building the model were illustrated. Such as accurate estimations of cut-off permeability and porosity values. These values directly affect the calculation of net pay thickness for each layer in the reservoir and consequently affect the target of estimating reservoir initial oil in place (IOIP). Also, the main challenge to the static modeling of such reservoirs is dealing with tight reservoir characteristics which cause major reservoir heterogeneity and complexities that are problematic to the process of modeling reservoir simulation. Twenty seven porosity and permeability measurements from Sadi/Tanuma reservoir were used to validate log interpretation data for model construction. The results of the history matching process of the constructed dynamic model is also presented in this paper, including data related to oil production, reservoir pressure, and well flowing pressure due to available production.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreThe present study attempts to give a detailed discussion and analysis of parenthetical constructions in English and Arabic, the aim being to pinpoint the points of similarity and difference between the two languages in this particular linguistic area.The study claims that various types of constructions in English and Arabic could be considered parenthetical; these include non-restrictive relative clauses, non-restrictive appositives, comment clauses, vocatives, interjections, among others. These are going to be identified, classified, and analyzed according to the Quirk grammar - the approach to grammatical description pioneered by Randolph Quirk and his associates, and published in a series of reference grammars during the 1970
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreSpinal dysraphism is the incomplete fusion of the neural arch, which can be seen as an occult or open neural tube defect. Meningoceles are a form of open neural tube defect characterized by cystic dilatation of the meninges containing cerebrospinal fluid without the involvement of neural tissue. Neurosurgical intervention is necessary in the newborn period since survival in advancing ages is often impossible. Therefore, meningoceles are rarely reported in adulthood. Here, we discussed a case of a 23-year-old female who presented with a meningocele in the lumbosacral area since birth, which had not been operated on. Surgical management and intraoperative findings are also discussed.
When industrial and constructional renaissance started in the world, the great interest was going on towards the equipment’s, which was the first mean for production. After industry was settled the interest was going on towards the men ship which manpower on which the production depends. It was approved that it represents the basic part in all of the processes and the protection of those individuals against dangers of these equipment’s, industry and its accidents was the basic things which was studied in many researches until it crystallized in general principles for all industries and other take care in each industry.
The professional safety is concerned as restrict which
... Show More