The CO2-Assisted Gravity Drainage process (GAGD) has been introduced to become one of the mostinfluential process to enhance oil recovery (EOR) methods in both secondary and tertiary recovery through immiscibleand miscible mode. Its advantages came from the ability of this process to provide gravity-stable oil displacement forenhancing oil recovery. Vertical injectors for CO2 gas have been placed at the crest of the pay zone to form a gas capwhich drain the oil towards the horizontal producing oil wells located above the oil-water-contact. The advantage ofhorizontal well is to provide big drainage area and small pressure drawdown due to the long penetration. Manysimulation and physical models of CO2-AGD process have been implemented at reservoir and ambient conditions tostudy the effect of this method to improve oil recovery and to examine the most parameters that control the CO2-AGDprocess. The CO2-AGD process has been developed and tested to increase oil recovery in reservoirs with bottom waterdrive and strong water coning tendencies. In this study, a scaled prototype 3D simulation model with bottom waterdrive was used for CO2-assisted gravity drainage. The CO2-AGD process performance was studied. Also the effects ofbottom water drive on the performance of immiscible CO2 assisted gravity drainage (enhanced oil recovery and watercut) was investigated. Four different statements scenarios through CO2-AGD process were implemented. Resultsrevealed that: ultimate oil recovery factor increases considerably when implemented CO2-AGD process (from 13.5%to 84.3%). Recovery factor rises with increasing the activity of bottom water drive (from 77.5% to 84.3%). Also,GAGD process provides better reservoir pressure maintenance to keep water cut near 0% limit until gas flood frontreaches the production well if the aquifer is active, and stays near 0% limit at all prediction period for limited waterdrive.
In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreThe Islamic art is filled with precious and holiness contents for what it carries of spiritual meanings represented by the Holy Quran, Hadith and texts which inspired the Calligrapher fertile imagination draw from it a wide space for holiness and spiritual expression with artistic explanation of aesthetic and decorative nature, its issuance pivots depended on decoration and calligraphy elements. The main elements which enriched the aesthetic and expressional side are the texts which used by the Calligraphers whom tried to be perfect and creative by presentation techniques and issuance treatments hold within the beauty of the shape and content. The most remarkable artistic achievements are honorable prophetic decoration for what it has of
... Show MoreThe Present investigation includes the isolation and identification of Pseudomonas aeruginosa for different cases of hospital contamination from 1/ 6/2003 to 30/9/2004, the identification of bacteria depended on morphological , cultural and biochemical characters, 37 of isolates were diagnosed from 70 smears from wounds and burns beside 25 isolates were identified from 200 smears taken from operation theater and hospital wards including the floors , walls , sources of light and operation equipment the sensitivity of all isolates to antibiotic were done , which exhibited complete sensitivity to Ciprofloxacin , Ceftraixon, Tobromycin and Gentamysin ,while they were complete resist to Amoxcillin , Tetracyclin , Nitrofurantion , Clindamycin C
... Show MoreCurrently regions in the world are much affected with dust storms, rising and suspended dust, as Iraq is suffering of this state as well within an eye-catching manner, whereas the storms leave negative traces on environment and public health and many of the other vital utilities. This research aims to diagnosis of the reasons that resulted in increment of dust storms in Iraq basing on some recorded data and to be analyzed in conformity with the prevalent theories and concepts at the atmospheric science and environmental physics. Generally the study, has illustrated that the climate changes and increase of temperatures averages because of green house effect, that followed by clear changes at thermal wind and jet stream, that caused to ins
... Show MoreIt is general known that any design in various fields such as the interior design in the field of spaces interior for the public and specific buildings that is concern about the use of humans resident , as well as other considerations relating to the organization of design elements and lines of locomotors activity and the validity of appropriate receiving to provide comfort and achieve the requirements of the position in the space of restaurants field of research.
The researcher choose the title of this study (processors design career in public spaces), the analytical study of the spaces of restaurants, as one of the public spaces that are running in their general environment of people in various strata , ages and other levels , whic
The purpose of this paper is to shed light on the concept of fuzzy logic ,its application in linguistics ,especially in language teaching and the fuzziness of some lexical items in English.
Fuzziness means that the semantic boundaries of some lexical items are indefinite and ideterminate.Fuzzy logic provides a very precise approach for dealing with this indeterminacy and uncertainty which grows (among other reasons) out of human behavior and the effect of society.
The concept of fuzzy logic has emerged in the development of the theory of fuzzy set by Lotfi Zadeh(a professor of computer science at the university of California) in 1965.It can be thought of as the application side of the fuzzy set theory. In linguistics, few scholars
The current research deals with an analytical study of the ceramic works of one of the most important Japanese cities in the ceramics industry, which is the city (Dachi-Cho), which is characterized by a special and unique style from the rest of the other Japanese cities, as it uses special techniques for its potters and the families to which they belong, such as the technique of grafting and neriage. And printing graphics on ceramic pots. These and other techniques have spread in various countries of Asia and Europe, all the way to America, and transformations and revolutions have begun in these techniques until they have reached the point of absurdity. With all this scientific and technological development, the city (Dachi-Chu) remained
... Show MoreThat interdependence in Islam is cooperation, love and fraternity and give and take
and let him look rich to the poor, every Muslim is himself liable hungry and poor no matter
how many races and colors. That interdependence is cruel, spending for God and is the
greatest supporter of charities that deal with housing, food and medicine for the unemployed
and needy, and social solidarity the consolidation of the values of brotherhood and love,
where is the greatest support of corrupt and concerted community and causes prosperity in
societies and has a significant impact on the unity of Muslims and their club and their
collection. The Islamic regime tops major systems in entrusting the achievement claimed the
lives of
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More