Preferred Language
Articles
/
pRYzLIcBVTCNdQwCODtn
Increasing confidence in full field modelling and water flood planning for a giant reservoir under primary depletion through Material Balance modelling
...Show More Authors
Abstract<p>One of the principle inputs to project economics and all business decisions is a realistic production forecast and a practical and achievable development plan (i.e. waterflood). Particularly this becomes challenging in supergiant oil fields with medium to low lateral connectivity. The main objectives of the Production Forecast and feasibility study for water injection are:</p><p>1- Provide an overview of the total expected production profile, expected wells potential/spare capacity, water breakthrough timing and water cut development over time</p><p>2- Highlight the requirements to maintain performance, suggest the optimum development pattern</p><p>3- Increasing confidence in business decisions to develop the reservoir in question</p><p>The main tool used for these purposes is a sophisticated reservoir simulation software, namely CMG©, since it can predict reservoir behavior, honor physical constraints and capture the heterogeneity within the reservoir to accurately predict performance. However, the starting point for this kind of complicated studies needs to start from the basics, in order to understand the big picture and be able to plan properly for the scope to be delivered, hence, utilizing analytical tools like MBAL becomes quite necessary, if not crucial, to the success of full field modelling and choosing an optimum water flood pattern and design.</p><p>This paper covers the methodology for building the reservoir component utilizing a Material Balance model, of which the results will be used as an input to reservoir simulation to evaluate and accurately predict reservoir performance, which directly feeds into planning for water flooding projects and selection of an optimum flood pattern.</p><p>A Tank model was built at first to assess and understand the driving forces (energies) of the reservoir in question, utilizing pressure and production data from legacy wells, the prepared model is also supported by geological and petro physical studies to give representative results. Acquired Static Bottom Hole Pressures (SBHPs) in wells were used as anchor points for the tank pressure and to test the validity of the history match. Multiple analytical methods to QC the results and STOIIP volume were conducted, e.g. the Havlena-Odeh method.</p><p>This methodology has been tested successfully in the stated super giant oil field, in which the reservoir in question is a carbonate rock formation. An example of this is covered in the paper. It was concluded that utilizing a history matched and coherent MBAL model before conducting a detailed reservoir simulation study can save a lot of time and effort by providing guidance to the path which needs to be followed, and sheds light on the critical elements to be looked after. This has also helped to uncover the driving mechanisms and energies in the reservoir, hence allowing the engineer to plan for the necessary voidage replacement and water injection rates to sustain the reservoir pressure and pattern development. Another technical advantage of the described method is the higher sustainability of the model.</p><p>The suggested method, in combination with geological and petro physical information available, can be applied to majority of the reservoirs. This combination is paramount to ensure optimum time and planning that is followed for each reservoir development study that involves water flooding.</p>
Scopus Crossref
View Publication
Publication Date
Mon Jul 31 2023
Journal Name
International Journal Of Sustainable Development And Planning
Monitoring and Prediction Functional Change of Land Uses Toward Urban Sustainability
...Show More Authors

Urban land uses are in a dynamic state that varies over time, the city of Karbala in Iraq has experienced functional changes over the past 100 years, as the city is characterized by the presence of significant tourist and socio-economic activity represented by religious tourism, and it occur due to various reasons such as urbanization. The purpose of this study is to apply a Markov model to analyze and predict the behavior of transforming the use of land in Karbala city over time. This can include the conversion of agricultural land, or other areas into residential, commercial, industrial land uses. The process of urbanization is typically driven by population growth, economic development, based on a set of probabilities and transitions bet

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Physics (ijp)
Structural and Infrared Spectroscopy of Polyvinylpyrrolidone/Multi-walled Carbon Nanotubes Nanocomposite
...Show More Authors

In this work, polyvinylpyrrolidone (PVP)/ Multi-walled carbon nanotubes (MWCNTs) nanocomposites were prepared with two concentrations of MWCNTs by casting method. Morphological, structural characteristics and electrical properties were investigated. The state of MWCNTs dispersion in a PVP matrix was indicated by Field Effect-Scanning Electron Microscopy (FESEM) which showed a uniform dispersion of MWCNTs within the PVP matrix. X-ray Diffraction (XRD) indicate strong bonding of carbonyl groups of PVP composite chains with MWCNTs. Fourier transfer infrared (FTIR) studies shows characteristics of various stretching and bending vibration bands, as well as shifts in some band locations and intensity changes in others. Hall effect was stu

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
The effect of formulation and process variables on prepared etoricoxib ‎Nanosponges
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus
Publication Date
Sun Jun 09 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Preliminary Anti-inflammatory Evaluation of New Etodolac Derivatives
...Show More Authors

Three new hydrazone derivatives of Etodolac were synthesized and evaluated for their anti-inflammatory activity by using egg white induced paw edema method. All the synthesized target compounds were characterized by CHN- microanalysis, FT-IR spectroscopy, and 1HNMR analysis. The synthesis of the target (P1-P3) compounds was accomplished following multistep reaction procedures. The synthesized target compounds were found to be active in reducing paw edema thickness and their anti-inflammatory effect was comparable to that of the standard (Etodolac).

View Publication Preview PDF
Scopus (18)
Crossref (6)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun May 01 2016
Journal Name
Energy Conversion And Management
Stability and thermophysical properties of non-covalently functionalized graphene nanoplatelets nanofluids
...Show More Authors

A pioneering idea for increasing the thermal performance of heat transfer fluids was to use ultrafine solid particles suspended in the base fluid. Nanofluids, synthesized by mixing solid nanometer sized particles at low concentrations with the base fluid, were used as a new heat transfer fluid and developed a remarkable effect on the thermophysical properties and heat transfer coefficient. For any nanofluid to be usable in heat transfer applications, the main concern is its long-term stability. The aim of this research is to investigate the effect of using four different surfactants (sodium dodecyl benzene sulfonate (SDBS), sodium dodecyl sulfate (SDS), cetyl trimethylammonium bromide (CTAB), and gum Arabic (GA)), each with three different

... Show More
Crossref (201)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Syntheses, Structures and Biological Activity of Some Schiff Base Metal Complexes
...Show More Authors

Four new binuclear Schiff base metal complexes [(MCl2)2L] {M = Fe 1, Co 2, Cu 3, Sn 4, L = N,N’-1,4-Phenylenebis (methanylylidene) bis (ethane-1,2-diamine)} have been synthesized using direct reaction between proligand (L) and the corresponding metal chloride (FeCl2, CoCl2, CuCl2 and SnCl2). The structures of the complexes have been conclusively determined by a set of spectroscopic techniques (FT-IR, 1H-NMR, and mass spectra). Finally, the biological properties of the complexes have been investigated with a comparative approach against different species of bacteria (E. coli G-, Pseudomonas G-, Bacillus G+,

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Determine, Predict and Map Soil pH Level by Fiber Optic Sensor
...Show More Authors
Abstract<p>Soil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.</p> ... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref