Production logging is used to diagnose well production problems by evaluating the flow profile, entries of unwanted fluids and downhole flow regimes. Evaluating wells production performance can be easily induce from production logs through interpretation of production log data to provide velocity profile and contribution of each zone on total production. Production logging results supply information for reservoir modeling, provide data to optimize the productivity of existing wells and plan drilling and completion strategies for future wells. Production logging was carried out in a production oil well from Mishrif formation of West Qurna field, with the objective to determine the flow profile and fluid contributions from the perforations after the stimulation job. The measurements were made under shut-in and three choke sizes (60/64”, 46/64” and 32/64”) flowing conditions. Overall, the data quality is acceptable to generate a good analysis. From the flowing surveys, it was observed that just the intervals 2250-2285 m and 2335-2375 m are contributing to the total well production while the well was flowing through the chokes 60/64” and 46/64”. However, most production is coming from the interval 2250-2285 m for each choke. The flow profile changed with the 32/64”, the interval 2250-2285 remained producing but the interval 2335-2375 m started receiving fluid from the upper interval. This cross flow increased after the well was shut in. The temperature log shows a normal behavior while the well is flowing through the 60/64” and 46/64” chokes, but changes as result of the cross flow with the 32/64” choke and with the well shut in. From the capacitance readings and pseudo fluid density (density from differential pressure) only oil is being produced, and there is a static water column at the sump.
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
Stress urinary incontinence (SUI) is involuntary urine leakage during activities that increase abdominal pressure such as coughing, sneezing and lifting of heavy weights. This is a very common disorder among women with history of multiple vaginal deliveries with an obstructed labor. SUI is considered one of the most distressing problems, especially for younger women, with severe quality of life implications, it caused by the loss of urethral support, usually as a consequence of the supporting structural muscles in the pelvis.
Objective: To prove and demonstrate the effect of a fractional CO2 micro-ablative laser (10600nm) in intra vaginal therapy for treating SUI and achieve a clinical improvement of t
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreIn this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreApplications of remote sensing are important in improving potato production through the broader adoption of precision agriculture. This technology could be useful in decreasing the potential contamination of soil and water due to the over-fertilization of agriculture crops. The objective of this study was to assess the utility of active sensors (Crop Circle™, Holland Scientific, Inc., Lincoln, NE, USA and GreenSeeker™, Trimble Navigation Limited, Sunnyvale, CA, USA) and passive sensors (multispectral imaging with Unmanned Arial Vehicles (UAVs)) to predict total potato yield and phosphorus (P) uptake. The experimental design was a randomized complete block with four replications and six P treatments, ranging from 0 to 280 kg P ha−1, as
... Show More