Geomechanical modelling and simulation are introduced to accurately determine the combined effects of hydrocarbon production and changes in rock properties due to geomechanical effects. The reservoir geomechanical model is concerned with stress-related issues and rock failure in compression, shear, and tension induced by reservoir pore pressure changes due to reservoir depletion. In this paper, a rock mechanical model is constructed in geomechanical mode, and reservoir geomechanics simulations are run for a carbonate gas reservoir. The study begins with assessment of the data, construction of 1D rock mechanical models along the well trajectory, the generation of a 3D mechanical earth model, and running a 4D geomechanical simulation using a two-way coupling simulation method, followed by results analysis. A dual porosity/permeability model is coupled with a 3D geomechanical model, and iterative two-way coupling simulation is performed to understand the changes in effective stress dynamics with the decrease in reservoir pressure due to production, and therefore to identify the changes in dual-continuum media conductivity to fluid flow and field ultimate recovery. The results of analysis show an observed effect on reservoir flow behaviour of a 4% decrease in gas ultimate recovery and considerable changes in matrix contribution and fracture properties, with the geomechanical effects on the matrix visibly decreasing the gas production potential, and the effect on the natural fracture contribution is limited on gas inflow. Generally, this could be due to slip flow of gas at the media walls of micro-extension fractures, and the flow contribution and fracture conductivity is quite sufficient for the volume that the matrixes feed the fractures. Also, the geomechanical simulation results show the stability of existing faults, emphasizing that the loading on the fault is too low to induce fault slip to create fracturing, and enhanced permeability provides efficient conduit for reservoir fluid flow in reservoirs characterized by natural fractures.
This study aimed to compare the safety and efficacy of laser lithotripsy and pneumatic lithotripsy, the two most commonly used transurethral lithotripsy methods for treating bladder stones in children in Iraq. Between January 2013 and December 2016, 64 children with bladder stones were included in this prospective randomized study, after ethical committee approval and written consent from the children’s parents or caregivers were obtained. Patients were assigned randomly by computer software to two groups treated with either pneumatic cystolithotripsy or laser lithotripsy. A 9 Fr. semirigid ureteroscope was used to pass the lithotripter through and fragment the stone. A catheter of 8–12 Fr. was then introduced and kept in place
... Show MoreMaterial obtained from the demolition of concrete structures and milling of flexible pavements has the highest potential for recyclability. This study aimed to evaluate the performance of hot mix asphalt with the concurrent use of recycled asphalt pavement (RAP) and recycled concrete aggregate (RCA). Contents of RAP and RCA were varied from 0% to 50% by fixing the total recycling materials percentage to 50%. Penetration grade 40/50 virgin binder and waste engine oil (WEO) as rejuvenator were used in the present study. A series of tests, such as Scanning electron microscopy (SEM), Marshall stability, indirect tensile strength test, IDEAL CT, uniaxial compression test, and resilient modulus test, were carried out to assess the performance of
... Show MoreThe research aims to test the two characteristics of the relationship between accounting profits and the stock returns, to find out the suitability of both of them in explaining the relationship between accounting profits and stock returns for joint stock companies registered in the Baghdad Stock Exchange, also aims to reaching the most appropriate specification for the relationship between the two variables of the company’s stock dealing in the Baghdad Stock Exchange, and get a set of results, the most important of which are: the ability of changing for both of these variables in the profits share and the stock level of the profits does not explain more than 9,9% of the market returns of the Iraqi Joint Stock Companies registered i
... Show MoreChildhood is characterized by ahigh privacy in the life of the child overall educational institutions in the world. Based on this specificity, modern education begins with a holistic vision of the child through all developmental aspects (moral, religious, emotional, social, linguistic, physical, health, and mental). This integration could be achieved through taking into consideration the needs and rights of children and developing curricula that consider these needs and capacities to provide opportunities for developing and supporting the developmental aspects of the child. The contemporary technological developments in the field of computer and the Internet have brought with it new forms, ideas, and problems for children in recent years
... Show MoreIn this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.
Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreConstruction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.