The optimization of artificial gas lift techniques plays a crucial role in the advancement of oil field development. This study focuses on investigating the impact of gas lift design and optimization on production outcomes within the Mishrif formation of the Halfaya oil field. A comprehensive production network nodal analysis model was formulated using a PIPESIM Optimizer-based Genetic Algorithm and meticulously calibrated utilizing field-collected data from a network comprising seven wells. This well group encompasses three directional wells currently employing gas lift and four naturally producing vertical wells. To augment productivity and optimize network performance, a novel gas lift design strategy was proposed. The optimization of gas allocation was executed to maximize oil production rates while minimizing the injected gas volume, thus achieving optimal oil production levels at the most effective gas injection volume for the designated network. The utilization of the PIPESIM Optimizer, founded on genetic algorithm principles, facilitated the attainment of these optimal parameters. The culmination of this study yielded an optimal oil production rate of 18,814 STB/d, accompanied by a gas lift injection rate of 7.56 MMscf/d. This research underscores the significance of strategic gas lift design and optimization in enhancing oil recovery and operational efficiency in complex reservoir systems like the Mishrif formation within the Halfaya oil field.
This research explores the use of solid polymer electrolytes (SPEs) as a conductive medium for sodium ions in sodium‐ion batteries, presenting a possible alternative to traditional lithium‐ion battery technology. The researchers prepare SPEs with varying molecular weight ratios of polyacrylonitrile (PAN) and sodium tetrafluoroborate (NaBF4) using a solution casting method with dimethyl formamide as the solvent. Through optical absorbance measurements, we identified the PAN:NaBF4 (80:20) SPE composition as having the lowest energy band gap value (4.48 eV). This composition also exhibits high thermal stability based on thermogravimetric analysis results.
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThin films of (CuO)x(ZnO)1-x composite were prepared by pulsed laser deposition technique and x ratio of 0≤ x ≤ 0.8 on clean corning glass substrate at room temperatures (RT) and annealed at 373 and 473K. The X-ray diffraction (XRD) analysis indicated that all prepared films have polycrystalline nature and the phase change from ZnO hexagonal wurtzite to CuO monoclinic structure with increasing x ratio. The deposited films were optically characterized by UV-VIS spectroscopy. The optical measurements showed that (CuO)x(ZnO)1-x films have direct energy gap. The energy band gaps of prepared thin films
Novel bidentate Schiff bases having nitrogen-sulphur donor sequence was synthesized from condensation of racemate camphor, (R)-camphor and (S)-camphor with Methyl hydrazinecarbodithioate (SMDTC). Its metal complexes were also prepared through the reaction of these ligands with silver and bismuth salts. All complexes were characterized by elemental analyses and various physico-chemical techniques. These Schiff bases behaved as uninegatively charged bidentate ligands and coordinated to the metal ions via ?-nitrogen and thiolate sulphur atoms. The NS Schiff bases formed complexes of general formula, [M(NS)2] or [M(NS)2.H2O] where M is BiIII or AgI, the expected geometry is octahedral for Bi(III) complexes while Ag(I) is expected to oxidized t
... Show More