Tight reservoirs have attracted the interest of the oil industry in recent years according to its significant impact on the global oil product. Several challenges are present when producing from these reservoirs due to its low to extra low permeability and very narrow pore throat radius. Development strategy selection for these reservoirs such as horizontal well placement, hydraulic fracture design, well completion, and smart production program, wellbore stability all need accurate characterizations of geomechanical parameters for these reservoirs. Geomechanical properties, including uniaxial compressive strength (UCS), static Young’s modulus (Es), and Poisson’s ratio (υs), were measured experimentally using both static and dynamic methods. Measured mechanical parameters on cores are used to correct well logs derived mechanical earth model (MEM). The analysis of measured mechanical properties of samples was conducted using the knowledge of cores mineralogy which was done in this study by the X-Ray Diffraction (XRD) test in addition to rock texture which was obtained using scanning electronic microscope (SEM). The study of SEM and TS of the samples explain the presence of vugges in some samples that cause its initial high porosity and consequently low UCS, also it causes lower compressional and shear velocity at these samples as compared to others. The minerals contained in each sample give a descriptive analysis of the difference of the values of both static and dynamic measured mechanical properties such as ultrasonic pulse traveling time, elastic properties, and UCS; this was explained through XRD results.
A numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro
In this work, four electronic states ( , , and ) of some diatomic molecules (InF and InCl) was studied by TD-DFT with energy represented by the exchange-correlation energy. The SAOP/ATZP model was applied here to determine all parameters (re, Be, De, , , Te , and were determined to creation reliable values for electron spectroscopy. Also, another set of this calculation has been used represented by two theoretical models: ATZP and et-QZ3P-xD model. Therefore these theoretical models for ( and , and ) of the molecules have been compared with many values, theoretical and experimental values, and appear converge
... Show MoreThis study includes determining the climatic conditions and the nature of the reservoirs in the region with the determination of the flow direction of the aquifer. The meteorological data for the Karbala station for the period 1976-2016 showed that the values of the monthly rates of temperature, precipitation, evaporation, relative humidity, wind speed and Sunshine duration are (24.19 C◦), (95.5 mm), (2828.6mm), (46.75%), (2.76 m/sec), and (8.61 h/day) respectively. Thorenthwait method was used to calculate the values of Potential Evapotranspiration (PE) then determine the annual value of WS and WD which equal 28.11mm and 941.94mm respectively. Mean monthly water surplus for the period (1976-2016) was recorded about (9.36mm) in Decembe
... Show MoreThe rapid evolution of wireless networking technologies opens the door to the evolution of the Wireless Sensor Networks (WSNs) and their applications in different fields. The WSN consists of small energy sensor nodes used in a harsh environment. The energy needed to communicate between the sensors networks can be identified as one of the major challenges. It is essential to avoid massive loss, or loss of packets, as well as rapid energy depletion and grid injustice, which lead to lower node efficiency and higher packet delivery delays. For this purpose, it was very important to track the usage of energy by nodes in order to improve general network efficiency by the use of intelligent methods to reduce the energy
... Show MoreBackground: Asthma is an allergic disease characterized by airway obstruction as a result of cellular accumulation due to the liberation of certain mediators. Among those mediators are the cytokines such as IL-5.
Patients & Methods: Interleukin-5 concentration has been estimated in 94 sera samples of Asthmatic patients in comparison with 41 non-asthmatic bronchitis as patient controls in addition to 30 apparent healthy control group using ELISA method.
Results & Conclusions: There is highly significant elevation of IL-5 in the asthmatic cases in comparison with healthy controls (P< 0.001). We conclude that this cytokine may play the major
role in asthmatic attack & it may be a good m
Estimating multivariate location and scatter with both affine equivariance and positive break down has always been difficult. Awell-known estimator which satisfies both properties is the Minimum volume Ellipsoid Estimator (MVE) Computing the exact (MVE) is often not feasible, so one usually resorts to an approximate Algorithm. In the regression setup, algorithm for positive-break down estimators like Least Median of squares typically recomputed the intercept at each step, to improve the result. This approach is called intercept adjustment. In this paper we show that a similar technique, called location adjustment, Can be applied to the (MVE). For this purpose we use the Minimum Volume Ball (MVB). In order
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
During more than (50) years past, India has achieved considerable social and economic progress. It is also generally assumed that the future progress will be even more rapid and that India will be an important player in the global market. India has only (2.5) percent of global land whereas it has to provide home for one-sixth of world's population .On examining the past trends of India's population ,it may be observed that during the latter half of the twentieth century ,about (650) million populations were added to the country ,thus living in a country with a high population density and high growth rate , India in need a transition from high fertility high mortality to a low fertility low mortality and towards stable population situatio
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.