Preferred Language
Articles
/
ijcpe-1044
Identifying Average Reservoir Pressure in Multilayered Oil Wells Using Selective Inflow Performance (SIP) Method
...Show More Authors

The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently.  Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates to surface conditions. Different types of Inflow Performance Relationship (IPR) equations can be used for SIP interpretation, including the Straight-line method, Fetkovitch method, and Laminar Internal Turbulent (LIT) relations. Although the SIP method can be used for single-phase flow, the interpreter can restrict the IPR’s calculations to a particular phase. This research discusses the difficulties in estimating the average reservoir pressure in multilayered reservoir completed wells over their production life. The SIP technique has been applied to some producing wells in the south of Iraq, which are completed in multiple producing reservoirs previously tested with a formation tester to estimate reservoir pressure and other parameters. Two wells are taken in the south of Iraq region, Zubair Oil Field, one with cross flow between perforations and the other well with no cross flow. An average pressure is not calculated for layer A in Well-1, because there is no contribution rate. While the average pressure for Well-1, layer B is 3414.49 psia. Also, the average pressure for Well-2, layer H is not calculated because there is no rate contribution from this layer, and the maximum average pressure was calculated in layer G, which is about 2606.26 psia. It is also found that the presence of cross flow has no effect on SIP calculations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Test the effectiveness of Method EMDR
...Show More Authors

Our country faced lots of crises specially Wars and still living under the traumatic events. This would result in psychological disorder specially the Acute Stress Disorder (ASD). That’s if not treated, it will turn to be over Post Traumatic Stress Disorder(PTSD). Also not mentioning the shortage of recourses speaks about war and crises. That treat with its inflections psychologically and sociologically theses cases if happened.

The importance of this study arise through it is objective to introduce a program for EMDR which give benefit for treat in health, social, educational institutes.

Aims:

The objective of this Study is the identification of a Test the effectiveness of Eye Movement Desensi

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Mar 18 2019
Journal Name
Civil Engineering Journal
Circularization Technique for Strengthening of Plain Concrete Short Square Columns Subjected to a Uniaxial Compression Compressive Pressure
...Show More Authors

This paper presents an experimental study for strengthening existing columns against axial compressive loads. The objective of this work is to study the behavior of concrete square columns strengthening with circulation technique. In Iraq, there are significantly more reinforced rectangular and square columns than reinforced circular columns in reinforced concrete buildings. Moreover, early research studies indicated that strengthening of rectangular or square columns using wraps of CFRP (Carbon Fiber Reinforced Polymer) provided rather little enhancement to their load-carrying capacity. In this paper, shape modification technique was performed to modify the shape (cross section) of the columns from square columns into circular colu

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Jan 22 2019
Journal Name
Horticulturae
Variable Pulsed Irrigation Algorithm (VPIA) to Reduce Runoff Losses under a Low-Pressure Lateral Move Irrigation Machine
...Show More Authors

Due to restrictions and limitations on agricultural water worldwide, one of the most effective ways to conserve water in this sector is to reduce the water losses and improve irrigation uniformity. Nowadays, the low-pressure sprinkler has been widely used to replace the high-pressure impact sprinklers in lateral move sprinkler irrigation systems due to its low operating cost and high efficiency. However, the hazard of surface runoff represents the biggest obstacle for low-pressure sprinkler systems. Most researchers have used the pulsing technique to apply variable-rate irrigation to match the crop water needs within a normal application rate that does not produce runoff. This research introduces a variable pulsed irrigation algorit

... Show More
View Publication
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Estimation the blast wave pressure effecters by apply Remote Sensing (RS) and Geographic Information System (GIS) techniques
...Show More Authors

After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr

... Show More
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Maximum Likelihood Method And Bayesian Method For Estimating Some Non-Homogeneous Poisson Processes Models
...Show More Authors

Abstract

The Non - Homogeneous Poisson  process is considered  as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).

This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto ,   to estimate th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref