Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is carried out for evaluating the reservoir quality and identification of flow unit used in reservoir zonation. In this study, flow zone indicator has been used to identify five layers belonging to Tertiary reservoirs. Consequently, the porosity-permeability cross plot has been done depending on FZI values as groups and for each group denoted to reservoir rock types. On the other hand, extending rock type identification in un-cored wells should apply a cluster analysis approach by using well logs data. Reservoir zonation has been achieved by cluster analysis approach and for each group known as cluster which variation and different with others. Five clusters generated in this study and permeability estimated depend on these groups in un-cored wells by using well log data that gives good results compared with different empirical methods.
In this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the
... Show MoreTo identify the fungi associated with water hyacinth (Eichhornia crassipes [Mart.] Solms), an aquatic weed, which presents in Tigris river from Baghdad south ward. Five regions from middle and south of Iraq (Al-Noumanya, Saeid Bin-Jubier, Al-Azizia, Al-Reyfay and Al-Hay) were selected for this study. Twelve fungal species were isolated. Alternaria alternata, Acremonium sp and Cladsporium herbarum, were the most frequently species (91.66 % ,50 % and 25 %) respectively. The fungi Alternaria alternata, Acremonium sp. and Phoma eupyrena were more aggressive to water hyacinth as (91.66%,83,33%, and 75%) in pathogenicity test.
A detailed systematic study of calcareous nannofossils was carried out for the Jaddala Formation in (Aj-10) well, Central Iraq. Seventy one species belong to twenty four genera of calcareous nannofossils were identified including sixty two of them were previously named and nine species were identified for the first time and they would not be given names until more information is obtained in the future to support this identification.
It is a recorded of five biostratigraphic zone, which suggested the age of the Jaddala Formation to be of early to late Eocene. The recorded biozone includes the following: Reticulofenestra dictyoda (Deflandre in Deflandre & Fert, 1954) Stradner & Edwards, 1968 Partial Range Biozone (CNE 5); Discoa
The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol
... Show MoreSearch Results at the International Journal of Science and Research (IJSR)
the student of the structure of the city and its constituent elements will clearly sense the invisible relationships that underlie the different forms of urban activity, which in turn are defined by the generality of the urban patterns in that city, which will vary clearly according to the location in the city. These relations will be embodied in their true form in the interactions between the different uses of the earth, and the change that will result from their regularity in the form of entities in independent groups, which may share with each other a component of it.
Therefore, the process of controlling the functional interactions between the uses of the urban land and the awareness of t
Increased diseases and obesity currently due to increased production and excessive consumption of foods manufactured from non-food sweeteners without attention to the risk of consuming those additional high calories due to consuming these refreshing products such as juices and other various drinks, especially in the summer season by most segments of Iraqi society, especially workers, children and school students the aim of this study. Therefore, the study designed to replace sucrose with 0.03, 0.04 and 0.05% of each of the white stevia crystals and milled dry stevia leaves in the laboratory manufacture of juices and its effect on the general and sensory characteristics and the extent of their acceptability among the specialized r
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show More