Production logging is used to diagnose well production problems by evaluating the flow profile, entries of unwanted fluids and downhole flow regimes. Evaluating wells production performance can be easily induce from production logs through interpretation of production log data to provide velocity profile and contribution of each zone on total production. Production logging results supply information for reservoir modeling, provide data to optimize the productivity of existing wells and plan drilling and completion strategies for future wells. Production logging was carried out in a production oil well from Mishrif formation of West Qurna field, with the objective to determine the flow profile and fluid contributions from the perforations after the stimulation job. The measurements were made under shut-in and three choke sizes (60/64”, 46/64” and 32/64”) flowing conditions. Overall, the data quality is acceptable to generate a good analysis. From the flowing surveys, it was observed that just the intervals 2250-2285 m and 2335-2375 m are contributing to the total well production while the well was flowing through the chokes 60/64” and 46/64”. However, most production is coming from the interval 2250-2285 m for each choke. The flow profile changed with the 32/64”, the interval 2250-2285 remained producing but the interval 2335-2375 m started receiving fluid from the upper interval. This cross flow increased after the well was shut in. The temperature log shows a normal behavior while the well is flowing through the 60/64” and 46/64” chokes, but changes as result of the cross flow with the 32/64” choke and with the well shut in. From the capacitance readings and pseudo fluid density (density from differential pressure) only oil is being produced, and there is a static water column at the sump.
The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreIn this paper, the complex of Lascoux in the case of partition (3,3,2) has been studied by using diagrams ,divided power of the place polarization ) (k ij ,Capelli identites and the idea of mapping Cone .
Numerical study is adapted to combine between piezoelectric fan as a turbulent air flow generator and perforated finned heat sinks. A single piezoelectric fan with different tip amplitudes placed eccentrically at the duct entrance. The problem of solid and perforated finned heat sinks is solved and analyzed numerically by using Ansys 17.2 fluent, and solving three dimensional energy and Navier–Stokes equations that set with RNG based k−ε scalable wall function turbulent model. Finite volume algorithm is used to solve both phases of solid and fluid. Calculations are done for three values of piezoelectric fan amplitudes 25 mm, 30 mm, and 40 mm, respectively. Results of this numerical study are compared with previous b
... Show MoreThe need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreIn this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn
... Show MoreTwo field experiments were conducted during the spring season 2020 in Karbala governorate to study the effect of irrigation systems, irrigation intervals, biofertilizers and polymers on some characteristics of vegetative growth and potato production. The results showed that there were significant differences in the values of the average plant height due to the effect of the double interference between the irrigation system and the improvers, The height of potato plant under any irrigation system was superior when adding conditioners compared to the control treatment, as it reached 48.56, 58.00 and 64.33cm when adding polymer, biofertilizer, and polymers+ biofertilizers, respectively compared with the control treatment of 44.64cm in the surf
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe effect of time (or corrosion products formation) on corrosion rates of carbon steel pipe in aerated 0.1N NaCl
solution under turbulent flow conditions is investigated. Tests are conducted using electrochemical polarization
technique by determining the limiting current density of oxygen reduction in Reynolds number range of 15000 to 110000
and temperature range of 30 to 60oC. The effect of corrosion products formation on the friction factor is studied and
discussed. Corrosion process is analyzed as a mass transfer operation and the mass transfer theory is employed to
express the corrosion rate. The results are compared with many proposed models particularly those based on the
concept of analogy among momentum, heat,