scholarly journals GEODYNAMICS

GEODYNAMICS ◽  
2011 ◽  
Vol 2(11)2011 (2(11)) ◽  
pp. 41-43
Author(s):  
S. A. Vyzhva ◽  
◽  
I. Bezrodna ◽  

Methodology is given estimates of rock-collectors according to the well-logging through inversion of acoustic data in the structure of pore space and its practical implementation on the example of carbonate horizons of well number 35 Lypovo -Dolinska area.

2009 ◽  
pp. 1135-1142
Author(s):  
Victor I. Khashchanskiy ◽  
Andrei L. Kustov

One of the applications of m-commerce is mobile authorization, that is, rights distribution to mobile users by sending authorization data (a token) to the mobile devices. For example, a supermarket can distribute personalized discount coupon tokens to its customers via SMS. The token can be a symbol string that the customers will present while paying for the goods at the cash desk. The example can be elaborated further—using location information from the mobile operator, the coupons can only be sent to, for example, those customers who are in close vicinity of the mall on Saturday (this will of course require customers to allow disclosing their location). In the example above, the token is used through its manual presentation. However, most interesting is the case when the service is released automatically, without a need for a human operator validating the token and releasing a service to the customer; for example, a vending machine at the automatic gas station must work automatically to be commercially viable. To succeed, this approach requires a convenient and uniform way of delivering authorization information to the point of service—it is obvious that an average user will only have enough patience for very simple operations. And this presents a problem. There are basically only three available local (i.e., short-range) wireless interfaces (LWI): WLAN, IR, and Bluetooth, which do not cover the whole range of mobile devices. WLAN has not gained popularity yet, while IR is gradually disappearing. Bluetooth is the most frequently used of them, but still it is not available in all phones. For every particular device it is possible to send a token out using some combination of LWI and presentation technology, but there is no common and easy-to-use combination. This is a threshold for the development of services. Taking a deeper look at the mobile devices, we can find one more non-standard simplex LWI, which is present in all devices—acoustical, where the transmitter is a phone ringer. Token presentation through acoustic interface along with general solution of token delivery via SIM Toolkit technology (see 3GPP TS, 1999) was presented by Khashchanskiy and Kustov (2001). However, mobile operators have not taken SIM Toolkit into any serious use, and the only alternative way of delivering sound tokens into the phone-ringing tone customization technology was not available for a broad range of devices at the time the aforementioned paper was published. Quite unexpectedly, recent development of mobile phone technologies gives a chance for sound tokens to become a better solution for the aforementioned problem, compared with other LWI. Namely, it can be stated that every contemporary mobile device supports either remote customization of ringing tones, or MMS, and in the majority of cases, even both, thus facilitating sound token receiving over the air. Most phone models can playback a received token with only a few button-clicks. Thus, a sound token-based solution meets the set criteria better than any other LWI. Token delivery works the same way for virtually all phones, and token presentation is simple. In this article we study the sound token solution practical implementation in detail. First, we select optimal modulation, encoding, and recognition algorithm, and we estimate data rate. Then we present results of experimental verification.


2021 ◽  
Author(s):  
Vladislav Blinov ◽  
JIN Shutang ◽  
Samat Ramatullayev ◽  
Anton Filimonov ◽  
Muratbek Zhabagenov ◽  
...  

Abstract Low porosity carbonate reservoirs of the Carboniferous and Devonian periods of the Caspian Basin in Western Kazakhstan are challenging to characterize using traditional well logging methods due to the complex structure of the pore space, which necessitates lengthy and sometimes ineffective production well tests. Limitations of standard well logging methods make it impossible to reliably identify productive reservoirs, determine boundary conditions, and delineate saturation. As a result, a unique approach is required, which includes the integration of special "high-tech" logging tools and wireline formation testers (WFT). This paper effectively demonstrates the use of this approach in an appraisal exploration well. The use of a wireline formation tester in conjunction with modern complex fluid analyzers and a radial probe allowed for testing several carbonate intervals with extremely low-permeability in one trip, which previously required stimulation to trigger fluid inflow in a cased well. This provided a new perspective on understanding the reservoir structure in the shortest amount of time possible.


Author(s):  
V. Khashchanskiy

One of the applications of m-commerce is mobile authorization, that is, rights distribution to mobile users by sending authorization data (a token) to the mobile devices. For example, a supermarket can distribute personalized discount coupon tokens to its customers via SMS. The token can be a symbol string that the customers will present while paying for the goods at the cash desk. The example can be elaborated further—using location information from the mobile operator, the coupons can only be sent to, for example, those customers who are in close vicinity of the mall on Saturday (this will of course require customers to allow disclosing their location).In the example above, the token is used through its manual presentation. However, most interesting is the case when the service is released automatically, without a need for a human operator validating the token and releasing a service to the customer; for example, a vending machine at the automatic gas station must work automatically to be commercially viable. To succeed, this approach requires a convenient and uniform way of delivering authorization information to the point of service—it is obvious that an average user will only have enough patience for very simple operations. And this presents a problem. There are basically only three available local (i.e., short-range) wireless interfaces (LWI): WLAN, IR, and Bluetooth, which do not cover the whole range of mobile devices. WLAN has not gained popularity yet, while IR is gradually disappearing. Bluetooth is the most frequently used of them, but still it is not available in all phones. For every particular device it is possible to send a token out using some combination of LWI and presentation technology, but there is no common and easy-to-use combination. This is a threshold for the development of services. Taking a deeper look at the mobile devices, we can find one more non-standard simplex LWI, which is present in all devices—acoustical, where the transmitter is a phone ringer. Token presentation through acoustic interface along with general solution of token delivery via SIM Toolkit technology (see 3GPP TS, 1999) was presented by Khashchanskiy and Kustov (2001). However, mobile operators have not taken SIM Toolkit into any serious use, and the only alternative way of delivering sound tokens into the phone-ringing tone customization technology was not available for a broad range of devices at the time the aforementioned paper was published. Quite unexpectedly, recent development of mobile phone technologies gives a chance for sound tokens to become a better solution for the aforementioned problem, compared with other LWI. Namely, it can be stated that every contemporary mobile device supports either remote customization of ringing tones, or MMS, and in the majority of cases, even both, thus facilitating sound token receiving over the air. Most phone models can playback a received token with only a few button-clicks. Thus, a sound token-based solution meets the set criteria better than any other LWI. Token delivery works the same way for virtually all phones, and token presentation is simple. In this article we study the sound token solution practical implementation in detail. First, we select optimal modulation, encoding, and recognition algorithm, and we estimate data rate. Then we present results of experimental verification.


2021 ◽  
Vol 6 (3) ◽  
pp. 12-22
Author(s):  
Еvgeniy О. Belyakov

Background. The technology of probability petrophysical estimation of parameters using layer-bylayer interpretation of well logging data is present in this paper. Specific features of the technology is to using both the vertical and horizontal processing. Aim. The aim of the technology is the possibility of its adaptation when interpreting well logging data using the approaches of the concept of pore space connectedness, which reduce the variability of estimates of productive thicknesses of reservoirs in comparison with traditional approaches to calculating geological reserves using fixed cutoff porosity coefficient. Materials and methods. The paper discusses the main features of modeling the uncertainties of the input parameters and ways of representing them in the form of various distributions with a description of a generalized algorithm for the probabilistic assessment of geological reserves. The distributions of the reservoir area, oil density and conversion factor, the basic version of the results of the reservoir logging data interpretation in the form of a table continuous in depth with readings from the logging methods curves in intervals homogeneous in lithology are use as input parameters when executing the algorithm. In addition, distributions reflecting variations in the uncertainties of geophysical parameters, constants of petrophysical models, boundary cutoff s for identifying reservoirs and assessing their saturation nature are used to the input of the algorithm. Results. An algorithm for probabilistic petrophysical assessment has been developed taking into account the use of petrophysical modeling within the framework of the concept of pore space connectivity and the layer-by-layer mode of interpretation of well logging data. It is shown that additional petrotyping, which makes it possible to clarify the parameter of pore space connectivity, reduces the error of the resulting estimates, which can reduce the risk of making ineffective decisions. Conclusions. It is show that additional petrotyping, which makes it possible to clarify the parameter of pore space connectedness, reduces the error of the resulting estimates, which can reduce the risk of making ineffective decisions.


Author(s):  
Xinglin Wang ◽  
◽  
Philip M. Singer ◽  
Yunke Liu ◽  
Zeliang Chen ◽  
...  

Permeability estimation is crucial for formation evaluation, but faces challenges when used in low-permeability, unconventional formations. NMR well logging is often used to estimate formation permeability, but in many unconventional formations, the current NMR methods are not adequate. We have developed a new method to estimate permeability using a modified Carman-Kozeny model with pore size, tortuosity, and porosity information inferred from NMR restricted diffusion measurements. In this study, we focus on two low-permeability, organic-rich chalks (0.017 and 0.035 md) with connate water present. They are from the same formation but have different depths, TOC (total organic carbon), and bitumen content. These differences affect pore size, tortuosity, and permeability. The core samples are pressure saturated with two hydrocarbons—high-pressure methane or decane—with connate water present. NMR measurements are conducted under pressure to obtain the restricted diffusivity of the hydrocarbon-bearing pore space. In planning the NMR restricted diffusivity measurements, an optimum series of diffusion-encoding times are chosen for the unipolar stimulated-echo pulse sequence to obtain the correlation between the restricted diffusivity (D) and free diffusion length (LD). By applying the Padé fit to the restricted diffusivity, we can better estimate the diffusive tortuosity (τ) and pore-body size (d) of the hydrocarbon-filled pore space. The estimated pore-body size, tortuosity, and porosity from NMR are then used to predict permeability. We introduce a modified Carman-Kozeny model, which shows advantages over older methods like SDR and Timur-Coates models. The advantages of the new method are shown in organic-rich chalk with complex pore structures and organic matter. This new method can potentially be used for estimating permeability by well-logging and core-log integration.


2008 ◽  
Vol 9 (7) ◽  
pp. n/a-n/a ◽  
Author(s):  
Myung W. Lee ◽  
William F. Waite

2019 ◽  
pp. 123-135
Author(s):  
Alexander Beljaev ◽  
Alexander Salugin ◽  
Elena Vorontsova

The methods of mathematical description of evaporation processes from light soils of the arid zone of Russia are discussed. The focus is on the evaporation of moisture from the aeration zone. The analysis of theoretical work in this area and the results of their practical implementation are presented. Mathematical models of evaporation are divided into two types: physical and mathematical, taking into account the interaction of moisture with the soil frame and phenomenological, based on balance relations with the use of ordinary differential equations. The analysis of the actual material on evaporation from light soils of the Privolzhskiy sands was carried out in the light of the theory of evaporation from the capillaries surface in the pore space, taking into account the diffusion and film movements of moisture. A semi-empirical model of moisture movement in the upper soil layers in the form of analytical formulas relating the evaporation rate to the physical state of the soil water was used to estimate the water loss during evaporation. Good agreement was obtained between the theoretical provisions on the capillary movement of moisture and the data on evaporation from the sandy soils of the steppe zone of Russia. Approximation of data on the precipitation falling dynamics during the year by semi-empirical dependencies in the form of analytical formulas determines their practical use in the work of agricultural producers.


Author(s):  
R. C. Gonzalez

Interest in digital image processing techniques dates back to the early 1920's, when digitized pictures of world news events were first transmitted by submarine cable between New York and London. Applications of digital image processing concepts, however, did not become widespread until the middle 1960's, when third-generation digital computers began to offer the speed and storage capabilities required for practical implementation of image processing algorithms. Since then, this area has experienced vigorous growth, having been a subject of interdisciplinary research in fields ranging from engineering and computer science to biology, chemistry, and medicine.


Author(s):  
C. C. Ahn ◽  
S. Karnes ◽  
M. Lvovsky ◽  
C. M. Garland ◽  
H. A. Atwater ◽  
...  

The bane of CCD imaging systems for transmission electron microscopy at intermediate and high voltages has been their relatively poor modulation transfer function (MTF), or line pair resolution. The problem originates primarily with the phosphor screen. On the one hand, screens should be thick so that as many incident electrons as possible are converted to photons, yielding a high detective quantum efficiency(DQE). The MTF diminishes as a function of scintillator thickness however, and to some extent as a function of fluorescence within the scintillator substrates. Fan has noted that the use of a thin layer of phosphor beneath a self supporting 2μ, thick Al substrate might provide the most appropriate compromise for high DQE and MTF in transmission electron microcscopes which operate at higher voltages. Monte Carlo simulations of high energy electron trajectories reveal that only little beam broadening occurs within this thickness of Al film. Consequently, the MTF is limited predominantly by broadening within the thin phosphor underlayer. There are difficulties however, in the practical implementation of this design, associated mostly with the mechanical stability of the Al support film.


Sign in / Sign up

Export Citation Format

Share Document