Do you want to publish a course? Click here

evaluate the performance of the drilling bits used in well Saddad-1-

تقييم عمل رؤوس الحفر في بئر صدد - 1 -

1055   1   20   0 ( 0 )
 Publication date 2017
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

The subject of this research is to evaluate the performance of the drilling bits used to reach the final depth of the well in regards to mechanical speed, (alpha) factor, the cost per meter and to recognize the bit that has the highest performance. Obtaining such important info is vital for the successful planning and running of the potential exploration and appraisal wells in Saddad area. The efficient planning of the drilling operations results in decreasing the total drilling time which reflects in turn on the significant decrease in the total drilling cost.

References used
Drilling Data Hand Book. 2004-International Association of Drilling Contractors (IADC)- Houston .USA.560p
John Gieck,1995, Drilling Engineers Workbook-A Distributed Learning Course ,Baker Hughes INTEQ Training & Development 2520 W.W. Thorne Houston, United States of America,410p
Dowell IDF Fluids Services2000 – Drilling Fluids- product data manual, Schlumberger ,560p
rate research

Read More

In this research we studied tricone drill bits by applying a mathematical model which gives an analysis the effected factors on its performance and efficiency(rate of penetration) , so we can change these factors in valid allowable rang of operati ng once , which it gives a positive impact on its performance which shorten time and cost of drilling run , that has been in one of the Syrian oil fields :Deir Ezzour petroleum company ..
This research aims to increase the production lifetime of oil and gas wells through avoiding the problems that production casing string may be exposed to. Such problems are caused by the effect of different drilling fluids as well as other fluids normally existed in the annular behind casing at the none-cemented intervals.
This research aims to decrease the cost of last production stages through decreasing the cost of potential casing repair by avoiding the problems that casing string may be exposed to. Such problems are caused by the temperature effect of salt dril ling fluids as well as other fluids normally existed in the annular behind casing at the nonecemented intervals.
"Korashina Anhdrite" formation in the Syrian Central Region's wells considered as covering for "Korashina Dolimite" formation which is a gas bearing reservoir, and consists of a succession of salt, clay, and Shale. Much of the problems faced durin g drilling this strata like (High over pull/drag values, high pumps pressure, drill string stuck), which led in some cases to stop the drilling operation, and thus an increase in the drilling time, resulting in high final cost for the completion of the well, salt saturated water based drilling mud used to drill this formation but it did not completely solve the problems. This research aims to find out drilling mud treated with some kinds of polymers and salts to be used to drill this formation with the least problems.
LTE’s success as a high throughput, and umbrella technology for wireless networks is highly affected by the researchers’ capability of solving its current security vulnerabilities. Mutual authentication was adopted by mobile networks to overcome v ulnerabilities exploited by “IMSI catcher” and other active attacks. 3GPP’s mutual authentication implementation in EPS AKA succeeded in enhancing the network’s security, but failed to cover weaknesses inherited from its predecessor (UMTS). One of those vulnerabilities is the passive capturing of IMSIs during user identification in the Authentication and Key Agreement protocol. Many researchers tried over the past years, to propose an alternative for EPS AKA, able to ensure high levels of security and offer acceptable QoS performance. In this paper, we will crypt-analyze (SPAKA and PBKP) which was claimed to solve EPS AKA’s privacy and mutual authentication weaknesses, then we will compare its QoS performance to EC-AKA and EPS AKA. Our proposed protocol “EC-AKA” is a real candidate to replace the current authentication and Key Agreement protocol, because of its excellent performance in all the studied parameters.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا