The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates to surface conditions. Different types of Inflow Performance Relationship (IPR) equations can be used for SIP interpretation, including the Straight-line method, Fetkovitch method, and Laminar Internal Turbulent (LIT) relations. Although the SIP method can be used for single-phase flow, the interpreter can restrict the IPR’s calculations to a particular phase. This research discusses the difficulties in estimating the average reservoir pressure in multilayered reservoir completed wells over their production life. The SIP technique has been applied to some producing wells in the south of Iraq, which are completed in multiple producing reservoirs previously tested with a formation tester to estimate reservoir pressure and other parameters. Two wells are taken in the south of Iraq region, Zubair Oil Field, one with cross flow between perforations and the other well with no cross flow. An average pressure is not calculated for layer A in Well-1, because there is no contribution rate. While the average pressure for Well-1, layer B is 3414.49 psia. Also, the average pressure for Well-2, layer H is not calculated because there is no rate contribution from this layer, and the maximum average pressure was calculated in layer G, which is about 2606.26 psia. It is also found that the presence of cross flow has no effect on SIP calculations.
The current research creates an overall relative analysis concerning the estimation of Meixner process parameters via the wavelet packet transform. Of noteworthy presentation relevance, it compares the moment method and the wavelet packet estimator for the four parameters of the Meixner process. In this paper, the research focuses on finding the best threshold value using the square root log and modified square root log methods with the wavelet packets in the presence of noise to enhance the efficiency and effectiveness of the denoising process for the financial asset market signal. In this regard, a simulation study compares the performance of moment estimation and wavelet packets for different sample sizes. The results show that wavelet p
... Show MoreAdsorption techniques are widely used to remove certain classes of pollutants from wastewater. Phenolic compounds represent one of the problematic groups. Na-Y zeolite has been synthesized from locally available Iraqi kaolin clay. Characterization of the prepared zeolite was made by XRD and surface area measurement using N2 adsorption. Both synthetic Na-Y zeolite and kaolin clay have been tested for adsorption of 4-Nitro-phenol in batch mode experiments. Maximum removal efficiencies of 90% and 80% were obtained using the prepared zeolite and kaolin clay, respectively. Kinetics and equilibrium adsorption isotherms were investigated. Investigations showed that both Langmuir and Freundlich isotherms fit the experimental data quite well. On the
... Show MoreThe assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
This research aims to investigate the color distribution of a huge sample of 613654 galaxies from the Sloan Digital Sky Survey (SDSS). Those galaxies are at a redshift of 0.001 - 0.5 and have magnitudes of g = 17 - 20. Five subsamples of galaxies at redshifts of (0.001 - 0.1), (0.1 - 0.2), (0.2 - 0.3), (0.3 - 0.4) and (0.4 - 0.5) have been extracted from the main sample. The color distributions (u-g), (g-r) and (u-r) have been produced and analysed using a Matlab code for the main sample as well as all five subsamples. Then a bimodal Gaussian fit to color distributions of data that have been carried out using minimum chi-square in Microsoft Office Excel. The results showed that the color distributions of the main sample and
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show More