Academic literature on the topic 'Good Thief'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Good Thief.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Good Thief"

1

Schrage, E. J. H. "A thief can’t pass good title." Maandblad voor Vermogensrecht 29, no. 9 (2019): 293–303. http://dx.doi.org/10.5553/mvv/157457672019029009001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gilchrist, Susan Fargo. "THE GOOD THIEF IMAGINED AS A PEDDLER." Source: Notes in the History of Art 17, no. 2 (1998): 4–14. http://dx.doi.org/10.1086/sou.17.2.23205597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei, Chenji, Jie Zheng, Lihui Xiong, et al. "Evaluation and Utilization of Nano-Micron Polymer Plug for Heterogeneous Carbonate Reservoir with Thief Zones." Advances in Polymer Technology 2020 (January 12, 2020): 1–7. http://dx.doi.org/10.1155/2020/3498583.

Full text
Abstract:
Thief zones are highly permeable zones in oil reservoirs which affect the performance greatly during water flooding. The most effective way to prevent the invalid circle of thief layer is the injection of high-concentration polymer slugs. In this paper, the plugging effect of nano-micron polymer flooding on the thief zone is studied by experimental and theoretical analysis. The changes of water content and flow resistance were analyzed under different conditions. The result shows that the model presented here has good agreement with the experimental results. The displacement effect is the best when the thief zone is located on the upper part of the reservoir. And the water content will decrease with the increase of flow resistance after nano-micron polymer injection. Besides, the higher the polymer concentration, the more obvious the decrease of water content, and more effective the plugging. This study has provided a quick and reasonable guide in the later adjustment of water flooding development of carbonate reservoirs with thief layers.
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Anzhu, Fachao Shan, Xiao Yang, Jiaqi Li, Chenggang Wang, and Junjian Li. "Thief zone identification and classification in unconsolidated sandstone reservoirs: A field case study." Journal of Petroleum Exploration and Production Technology 11, no. 9 (2021): 3451–62. http://dx.doi.org/10.1007/s13202-021-01239-6.

Full text
Abstract:
AbstractChanneling between injectors and producers leads to bypassed oil left in the reservoir, which is one of most common reasons that wells in mature oil fields experience high water cut after long-term waterflooding. Identification and evaluation of the higher permeable channels (thief zones) are the key to effectively plug these thief zones and improve the conformance of water flood. This study applies three different methods to identify and evaluate the thief zones of a water injection project in North Buzazi Oilfield, a thick-bedded unconsolidated sandstone heavy oil reservoir in Manghestau, Kazakhstan. The thief zones, which evolve as a result of formation erosion and sand production, are identified and classified with respect to four different levels of significance using fuzzy comprehensive evaluation, production/injection profile method and pressure index (PI) methods. Good consistency is observed among the identification results using these methods. Finally, we present two ways to quantitatively evaluate the characteristics of the thief zones using water–oil-ratio as the input, which can be readily applied for future field development design.
APA, Harvard, Vancouver, ISO, and other styles
5

Karczewski, Pantelejmon. "Theological and liturgical significance of troparia of the Beatitudes (Makarismoi) of the Holy Friday Matins." Elpis 24 (2022): 9–13. http://dx.doi.org/10.15290/elpis.2022.24.01.

Full text
Abstract:
On Good Friday matins, after singing the antiphons and before reading the canon, the verses of the Gospel blessings are read, which in liturgical practice begin with the words of the good thief: “Remember me, o Lord, in Your Kingdom”. The phrase of the thief hanging on the Cross sounds special on Good Friday – it is the day on which these words were spoken originally. Special troparions are added to the verses of the blessings, which talk about various aspects of Christ’s passion, mainly through the prism of the thief’s repentance. In the paper, the texts are analyzed taking into account the Greek original and selected translations.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Bingjian, Hamad Najeh, Jim Lantz, Mansoor Ali Rampurawala, Ihsan Gok, and Mohammed Al-Khabbaz. "Detecting Thief Zones in Carbonate Reservoirs by Integrating Borehole Images With Dynamic Measurements: Case Study From the Mauddud Reservoir, North Kuwait." SPE Reservoir Evaluation & Engineering 13, no. 02 (2010): 193–202. http://dx.doi.org/10.2118/116286-pa.

Full text
Abstract:
Summary One of the key issues in creating a good reservoir model in carbonate reservoirs is identifying the horizontal permeability conduits—"thief zones"—if there are any. In the Sabriyah field in Kuwait, dynamic measurements showed evidence of thief zones in the Lower Cretaceous (Albian) Mauddud formation. Early water breakthrough has occurred in some wells. Previous studies indicated that it was very challenging to detect the thinly layered thief zones using conventional openhole logs. This paper describes a method of recognizing the different types of thief zones in the Mauddud carbonate reservoirs using high-resolution image logs with calibration from core and dynamic measurements and by integrating image logs with nuclear magnetic resonance (NMR) and conventional openhole logs. The Mauddud carbonates are Early Albian in age and consist of grainstones, wackstones, and mudstones deposited in a ramp setting. Observations from production logging tools (PLTs) and production data indicated that there are a few thief zones in different levels within the vertical Mauddud sequence. A previous core study shows that the fractures in the Mauddud formation are short (<10 cm) and concentrated in diagenetically cemented layers. The fractured thin layers are believed to be the principal type of thief zone. Another type of thief zone is associated with better-developed vuggy porosity. This study shows that both fractured and vuggy porosity-related types of thief zones can potentially be detected through integration of high-resolution image logs with PLT, NMR, and conventional logs. In addition, methods of estimating fracture permeability and porosity-related permeability based on logs are also proposed. The log-estimated permeability determined using this approach fits better with the production profile and can then be used to evaluate the thief zones in a more quantitative manner.
APA, Harvard, Vancouver, ISO, and other styles
7

Namazi, Majid, Conrad Sanderson, M. A. Newton, and Abdul Sattar. "Surrogate Assisted Optimisation for Travelling Thief Problems." Proceedings of the International Symposium on Combinatorial Search 11, no. 1 (2021): 111–15. http://dx.doi.org/10.1609/socs.v11i1.18542.

Full text
Abstract:
The travelling thief problem (TTP) is a multi-component optimisation problem involving two interdependent NP-hard components: the travelling salesman problem (TSP) and the knapsack problem (KP). Recent state-of-the-art TTP solvers modify the underlying TSP and KP solutions in an iterative and interleaved fashion. The TSP solution (cyclic tour) is typically changed in a deterministic way, while changes to the KP solution typically involve a random search, effectively resulting in a quasi-meandering exploration of the TTP solution space. Once a plateau is reached, the iterative search of the TTP solution space is restarted by using a new initial TSP tour. We propose to make the search more efficient though an adaptive surrogate model (based on a customised form of Support Vector Regression) that learns the characteristics of initial TSP tours that lead to good TTP solutions. The model is used to filter out non-promising initial TSP tours, in effect reducing the amount of time spent to find a good TTP solution. Experiments on a broad range of benchmark TTP instances indicate that the proposed approach filters out a considerable number of non-promising initial tours, at the cost of missing only a small number of the best TTP solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Guittard, Jennifer. "When the Good Object is also a Thief: A Memoir of Adoption." Journal of the American Psychoanalytic Association 70, no. 1 (2022): 39–76. http://dx.doi.org/10.1177/00030651221084598.

Full text
Abstract:
This contemporary Kleinian memoir explores the possible existence of an intrapsychic, adoption-specific preoedipal triad including child, birth mother, and adoptive mother that can shape the emerging mind. As an intrapsychic construct, the adoption triad comes to exist in the infantile mind, requiring that adoptees contend with four additional part-object maternal representations: a villain (bad birth mother), a victim (good birth mother), a rescuer (good adoptive other), and a thief (bad adoptive mother). The psychic complexities of this possible adoption triad are explored, with an eye to how it might illuminate the psychosocial challenges experienced by some adoptees, including dysregulated behavior, rage, dissociation, and shame. To this end, Bion’s ideas regarding presymbolic, nondefensive communication and Winnicott’s understanding of use of the object are invoked. Expanding the preoedipal paradigm of adoption to include the possibility of an intrapsychic, adoption-specific maternal triad can enhance our understanding of the psychology of adoption, as well as highlight the need to consider the ways in which internal objects can exist simultaneously in both dyadic and triadic paradigms.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Wenhao, Xingguo Chen, Yuwei Li, and Cheng Zhu. "Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack–Defense Game." Applied Sciences 14, no. 20 (2024): 9234. http://dx.doi.org/10.3390/app14209234.

Full text
Abstract:
This paper presents a novel multi-dimensional asymmetric game model for network attack–defense decision-making, called “Catch the Cyber Thief”. The model is built upon the concept of partially observable stochastic games (POSG) and is designed to systematically incorporate multi-dimensional asymmetry into network attack–defense problems. The attack agent is called a “thief” who wants to control a key host by exploring the unfamiliar network environment, and the defense agent is called a “police” who needs to catch the opponent before its goal is accomplished. The results indicate that the asymmetry of network attack and defense is not only influenced by attack and defense strategies but also by spatio-temporal factors such as the attacker’s initial position, network topology, and defense lag time. In addition, we have found that there may exist the “attack rhythm,” which makes “how to maintain a good attack rhythm” and “how to generate a robust defense strategy against different attackers” worth exploring. Compared with existing attack–defense game models, our game model can better generate a direct mapping relationship with real elements, enabling us to understand network attack and defense interactions better, recognize security risks, and design defense strategies that can directly serve real-world decision-making.
APA, Harvard, Vancouver, ISO, and other styles
10

Schoot, Henk J. M. "Eucharistic Transformation. Thomas Aquinas’ Adoro Te Devote." Perichoresis 14, no. 2 (2016): 67–79. http://dx.doi.org/10.1515/perc-2016-0011.

Full text
Abstract:
Abstract Originally the Adoro te devote was not a liturgical hymn but a prayer, probably intended by Thomas Aquinas for personal use when attending mass. Quoting the at present most reliable version of the poem, the author studies Adoro te devote from the angle of transformation: poetic, Eucharistic and mystic or eschatological transformation. Structure and form are analysed, and a number of themes discussed: two alternative interpretations of adoration, several concepts of truth intended in the poem, the good thief and doubting Thomas as symbols of moral and spiritual imperfection, and (present and future) living in connection, in union with God.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Good Thief"

1

Laszczukowska, Karolina. "A good collector never sells : En jämförelse mellan sekelskiftets och samtida konstsamlare." Thesis, Uppsala universitet, Konstvetenskapliga institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-386399.

Full text
Abstract:
This bachelor thesis evolves around the topic of art collectors as a phenomenon throughout different centuries. Ernest Thiel was a Swedish art collector at the turn of- and early 20th- century. Tom Böttiger is a contemporary art collector who acquired his first artwork during the 80’s. Both collectors are more like than alike, which points to and enforces certain common stereotypes as to whom could be a collector and what kinds of collectors exist. This thesis compares those two collectors from different times, from an art collectors perspective. The thesis concluded that collectors often bring upon themselves to act as patrons for the artists, both by promoting and purchasing their works, but also by aiding them financially.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Good Thief"

1

Tinti, Hannah. The Good Thief. Random House Publishing Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tinti, Hannah. The good thief. Dial Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Howe, Marie. The Good Thief. Persea Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shan, Darren. Demon thief. Little, Brown, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tinti, Hannah. The good thief: A novel. Dial Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rethual, Gilbert. The good thief: A novel. G. Rethual, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tinti, Hannah. The good thief: A novel. Thorndike Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shan, Darren. Demon thief. Little, Brown, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shan, Darren. Demon Thief. Little, Brown Books for Young Readers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shan, Darren. Demon thief. HarperCollins Children's Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Good Thief"

1

Faucher, Nicolas. "Common Goods and the Common Good in John Duns Scotus." In Common Good and Self-Interest in Medieval and Early Modern Philosophy. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55304-2_7.

Full text
Abstract:
AbstractJohn Duns Scotus did not devote a treatise or even a question to the matter of the common good, or the good of the community, as opposed to the good of the individual. Throughout his moral and political writings, he did, however, provide a sketch of his views regarding the general nature of the common good, defined as what is to be preserved by the laws of human communities as well as regarding the way in which this can be applied concretely. Most of the developments that pertain to this topic can be found in Ordinatio 4, distinction 15, question 2, a question devoted to whether a penitent thief ought to make restitution to his victims. In discussing this, Scotus produces a short biblical genealogy of private property as it was known and practiced in the societies of his time: it was instituted in answer to the Fall to ensure that humans interact peacefully and that each of them has what they need to survive. This goal is a general definition of the common good itself, which is obtained by making all goods private and by having a wise ruler to arbitrate all conflicts. This chapter examines what this view entails.
APA, Harvard, Vancouver, ISO, and other styles
2

Dzon, Mary. "Out of Egypt, Into England: Tales of the Good Thief for Medieval English Audiences." In Devotional Culture in Late Medieval England and Europe. Brepols Publishers, 2014. http://dx.doi.org/10.1484/m.mcs-eb.5.103039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Feldner, Maximilian. "Returning to Nigeria: Teju Cole’s Every Day Is for the Thief (2007) and Sefi Atta’s Everything Good Will Come (2005)." In Narrating the New African Diaspora. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05743-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lowe, Elizabeth, and Dain Borges. "A Thief." In Esau And Jacob. Oxford University PressNew York, NY, 2000. http://dx.doi.org/10.1093/oso/9780195108118.003.0040.

Full text
Abstract:
Abstract They arrived at the Largo da Carioca, got off the trolley, and said good-bye. She went to the Rua Gon ç alves Dias, and he headed for the Rua da Carioca. Midway down that street, Aires encountered a knot of people standing, then moving toward the square. Aires wanted to reverse his direction, not from fear but from horror. He had a horror of the crowd. He saw that there were not that many people, fifty or sixty, and he heard them crying out against the arrest of a man. He entered an alley, waiting for the throng to pass. Two policemen held the prisoner by the arms. From time to time he resisted, and then it was necessary to drag or force him another way. It was, apparently, about the theft of a wallet.
APA, Harvard, Vancouver, ISO, and other styles
5

"4 Jesus, Barabbas and the Good Thief." In Justice Blindfolded. BRILL, 2018. http://dx.doi.org/10.1163/9789004368675_005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harvey, Brian W., and Carla J. Shapreau. "The Purloined Violin." In Violin Fraud. Oxford University PressOxford, 1997. http://dx.doi.org/10.1093/oso/9780198166559.003.0009.

Full text
Abstract:
Abstract As noted by Brian Harvey in Chapter 7 on stolen violins, violins have repeatedly been an attractive target for thieves motivated by profit or passion for the instrument. In the USA, as in Eng land, a good faith purchaser cannot generally acquire title to, or right to possession of, stolen property, nor can a person receiving stolen goods from a thief, or a person in line of possession of a thief, obtain title to stolen goods.1 Although the law may vary in different states, most states have adopted the Uniform Commercial Code (UCC) which provides that ‘[a] purchaser of goods acquires all title which his transferor had or had power to transfer.’
APA, Harvard, Vancouver, ISO, and other styles
7

"Text 5 A good day for a thief". У A Reader in Syriac Based on the Entertaining Stories of Gregory Bar ʿEbrāyā. Gorgias Press, 2023. http://dx.doi.org/10.31826/9781463244903-007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Amaral, Fernanda. "2 “A Good Thief Is a Dead Thief”: Police and Violence in a Century of Favela." In Voices from the Favelas. Rowman & Littlefield Publishers, 2021. https://doi.org/10.5771/9781538147443-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Elise. "The Records." In The Making of Felony Procedure in Middle English Literature. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/9780191967023.003.0005.

Full text
Abstract:
Abstract Chapter 4 is about the documentary system of medieval English criminal procedure in the common law, and focuses on robbery as an example to argue that juries used these documents to give nuance to their verdicts. Robbery was hotly condemned in both judicial and social comment, but hazily defined and rarely punished. The chapter considers this phenomenon in the legal record alongside the unpunishable Good Thief, whose unearned salvation plagues the main character in William Langland’s Piers Plowman. Like the robbers that were hauled up repeatedly before the court only to slip the noose, the poem returns again and again to the story but discovers that, however you tell it, the Thief is always saved. The chapter argues that this repetition—in the poem and in the archive—helped the documentation of felony procedure capture the complexity of jury deliberations and express a range of conclusions beyond “guilty” and “acquitted.”
APA, Harvard, Vancouver, ISO, and other styles
10

Patry, William. "Moral Panics, Folk Devils, and Fear as a Tactical Weapon." In Moral Panics and the Copyright Wars. Oxford University PressNew York, NY, 2009. http://dx.doi.org/10.1093/oso/9780195385649.003.0007.

Full text
Abstract:
Abstract The power of the concepts “thief” and “trespasser” is traceable to the fundamental negative associations they invoke. Thieves and trespassers are usually metaphoric, fictive creations (outside of course, people who actually do steal your wallet or enter your land without your permission and refuse to leave).They are also examples of moral panics. Moral panics in copyright are the flip side of the initial classification of copyright as property. The appellation thief or trespasser is meaningless without an owner of property from whom one can steal or commit trespass. In Daniel Defoe’s famous novel, did the cannibals care a hoot about Robinson Crusoe’s fenced-in habitation and cave? Hardly; to them, he was food, and if they had eaten him, they would not have taken over his created space; nor would it have prevented Crusoe from becoming an entrée if he had claimed a fee simple absolute over his living quarters and refused entry to the cannibals as trespassers. What good, then, is it to say you own property if there are no thieves or trespassers to do battle with? Copyright owners claiming status as property owners need to create conflict with others to create their status; the classical way in which such conflict is created is through moral panics.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Good Thief"

1

Kvilaas, G. F., M. Moradi, B. Voll, and P. H. Mortensen. "Performance Optimization of Water Injection Wells Using Autonomous Outflow Control Device Technology in Offshore Norway." In SPE Norway Subsurface Conference. SPE, 2024. http://dx.doi.org/10.2118/218473-ms.

Full text
Abstract:
Abstract Making good horizontal water injection wells is more challenging than making good horizontal producers, linked to the uncertainty around formation impairment (if no or limited clean-up) and the possible problem of "thief zones" that steal a major part of the injected water and deliver low sweep efficiency. Autonomous Outflow Control Devices (AOCD) can reduce the problem of "thief zones" and were piloted in a recent well in the Ivar Aasen water injector offshore Norway. To limit injection into possible thief zones (or limit the chance of making such thief zones) normal ICDs, often used for injectors as well as producers, were installed in combination with the new technology that close at a certain differential pressure or injection rate. As a dual system, this should give quite an even injection along the whole well. Completion design studies were performed in both the full dynamic reservoir model and a simpler steady-state inflow/outflow wellbore modelling pre-drill. The completion design was finalized post-drill by quickly updating the model with the actual log data from the drilled well. While tracers indicated a clean well after the initial clean-up, the well surveillance during injection logging confirmed injection along the entire completed interval of the wellbore. Also, a significant breaking point on the step-rate test (SRT) was observed which was different behaviour than what has been conventionally observed from the wells completed with non-AOCD completion. Improved water management is key for many assets such as Ivar Aasen field. The first pilot installations of AOCD technology in Norway in this field demonstrated this technology could help to make better wells and improve sweep efficiency in difficult geological formations. This again improves the environmental measures such as power usage and the need for chemicals to treat injected and produced water.
APA, Harvard, Vancouver, ISO, and other styles
2

Xiao, K., H. Jiang, Q. Wang, H. Wang, and D. Zhao. "Adaptability Study on Plugging Thief Zones with Asphalt Particle in Polymer Flooding Offshore Field." In SPE Energy Resources Conference. SPE, 2014. http://dx.doi.org/10.2118/spe-169931-ms.

Full text
Abstract:
Abstract Polymer flooding has been proved to be an effective method for improving oil recovery in offshore field of Bohai area, but thief zones with high permeability could make the effect of polymer on oil production worse. To try to minimize the negative impact brought by thief zones, we apply asphalt particle to plug the high permeability regions to compel subsequent displacement fluid change flowing direction to enhance sweep efficiency. Its adaptability is studied by a series of parallel cores flooding. Besides, numerical simulations are carried out to optimize pattern of asphalt particle injection and evaluate the performances of asphalt flooding in a typical well group in Bohai area in a numerical model. In addition to performances of water cut and oil recovery for the parallel core flooding, we present dynamic features of remaining oil from micro views detected by nuclear magnetic resonance. By plugging thief zone by asphalt flooding, oil production is improved. Production in small and medium pores is increased by asphalt flowing into big pores to exert strong resistance on them. Also, with numerical simulations, optimal way of injecting asphalt has been selected to lead the operation in field. Through observation of a typical well group under asphalt injection in numerical model based on real reservoir, the water-cut and oil production are decrease 9.7% and increase 29.1m3/d respectively. We conclude that asphalt particle has good capacity to plug thief zones to improve sweep efficiency of subsequent displacement fluid in polymer flooding field. In-depth understanding such mechanisms for asphalt particle behavior may be pivotal for enhancing oil recovery in polymer flooding reservoir containing thief zones.
APA, Harvard, Vancouver, ISO, and other styles
3

Jones, Sian, Robert Bos, Vaclav Lastovka, Rouhi Farajzadeh, and Mohammed Riyami. "Experimental Assessment of the Viability of High Temperature Steam Foam Applications." In SPE Conference at Oman Petroleum & Energy Show. SPE, 2022. http://dx.doi.org/10.2118/200198-ms.

Full text
Abstract:
Abstract The efficiency of oil processes depends on the product of volumetric sweep and microscopic sweep. In oil recovery by steam injection the microscopic sweep is generally good; however, obtaining a good volumetric sweep can be challenging. This is caused by low density and viscosity of the injected steam combined with the reservoir heterogeneity, in particular existence of thief zone. Consequently, the steam utilization factor measured by steam-to-oil ratio (SOR, kg steam/bbl of oil) for many steam-flooding projects becomes poor. All these issues can be addressed by a successful application of steam foam technology. In steam foam applications, steam (plus a non-condensing gas) is injected simulateneously with a surfactant solution. Under the favorable injection conditions a foam is formed inside the reservoir leading to significant reduction of steam mobility and can eventually improve sweep efficiency. In the literature many successful steam foam pilots have been reported. However, most of these applications are at relatively shallow reservoirs with low pressures and thus low temperatures. In our paper we investigate if steam foam can also be effectively used for applications at high steam temperatures, significantly exceeding 200°C. To test the viability of steam foam technology at high temperatures, we have tested the stability of multiple surfactants at reservoir conditions. For those surfactants that showed good stability, core flood tests have been carried out to test the ability to form foam and to assess the resulting foam strength. Steam foam tests have also been carried out at temperature up to 240°C.
APA, Harvard, Vancouver, ISO, and other styles
4

Nan, Zhao, Zhang Liwei, Wang Rongjun, et al. "Experimental Study on Temporary Plugging Diverting Acidification of Heterogeneous Sandstone Reservoirs." In ASME 2022 41st International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/omae2022-78751.

Full text
Abstract:
Abstract Matrix acidizing is the primary well stimulation method applied to increase the oil and gas production of sandstone reservoirs. However, for reservoirs with many small layers and strong heterogeneity, the permeability of the thief zone is increased because a large amount of acid is easy to enter it, and the less permeable layer that needs to be stimulated cannot be improved, which lead to the interlayer heterogeneity more serious. The method of uniform distribution acid in heterogeneous sandstone reservoirs has been rarely studied. In this paper, temporary plugging and diverting acidizing is suggested to solve the problem of uniform acid distribution in heterogeneous sandstone reservoirs. The temporarily plugged powder is trapped in the front edge of the high-permeability core to form a filter cake. The acid is forced to enter the low-permeability core to achieve uniform acidification. The results show that the dissolving rate of 50 and 100 mesh temporarily blocked powders is more than 99% under the condition of reservoir temperature and can flowback entirely to the surface without harming the reservoir. The core flooding experiment shows that a 2MPa diverting pressure was induced by 0.1% temporary plugging powder. when the permeability level difference is 50, the permeability of the low permeability core can be improved by more than 50%. It indicated that the temporary plugging powder has a strong plugging ability for high permeability core and a good stimulation effect for low permeability core. Laboratory experiments show that temporary plugging diverting acidification (TPDA) has an excellent stimulation effect on the reservoir with strong heterogeneity in the long well section, which will be an important reference for the realization of uniform acidizing.
APA, Harvard, Vancouver, ISO, and other styles
5

Al Hinai, Nasser, Pankaj Agarwal, Smirnov Dmitrii, et al. "Pressure Transient Analysis (PTA) Enables a New Approach for Building Robust Reservoir Permeability Distribution for Miscible Gas Injection Development." In International Petroleum Technology Conference. IPTC, 2024. http://dx.doi.org/10.2523/iptc-24514-ms.

Full text
Abstract:
Abstract Accurate estimation of oil recovery and optimization of reservoir performance requires realistic estimates of permeability distribution. This paper presents an approach to build different modeling realizations for testing possible reservoir behavior during miscible gas injection (MGI) and UR range for MGI development. Multiple geological realizations were built for nine Area-H carbonated reservoirs to bracket the permeability distribution range away from well control, which is a major uncertainty impacting production behavior and history match. Two main factors that affect ultimate recovery and production forecasts are property distribution and permeability range. Therefore, different geological and dynamic model realizations were built to test the reservoir behavior during MGI, which helped to make reliable estimates of production profiles and UR. Full-field reservoir models were constructed for multiple geological realizations, and permeability distribution results showed that using permeability-thickness (KH) and high-perm model methods increased confidence by preserving high-permeability streaks and introducing higher heterogeneity. Fewer changes were required to calibrate the full-field reservoir model to actual pressure data with KH than with conventional core-based permeability. High-permeability streak models provided faster gas breakthrough, higher GOR, and lower UR than conventional and KH-matched models. High-contrast permeability models provided a higher confidence estimation of faster gas breakthrough and oil recovery. High-permeability streaks and high-contrast models can mitigate the negative influence of enhanced reservoir heterogeneity on field production performance forecast. As a result, robust ranges of production profiles and promise would help the project forecast robustness check against low case realizations and upfront planning on potential mitigation/recovery options in case of heterogeneity indies thief zone behavior leading to faster gas breakthrough. A new approach is presented that helps to estimate realistic production forecasts and UR ranges for gas injection development projects. It allows testing models for different subsurface realizations and generating robust project economics. The methodology given in this study can show a good practice for the characterization of heterogeneous reservoirs for MGI flooding development, especially for capturing the downside as an alternate geological realization.
APA, Harvard, Vancouver, ISO, and other styles
6

Rehman, S., W. H. Mirza, I. B. Espinoza, and U. Farooq. "Deriving the Unknown Sublayer's Pressure in Producing Gas Wells Using the Selective Inflow Performance Workflow." In International Petroleum Technology Conference. IPTC, 2024. http://dx.doi.org/10.2523/iptc-23216-ms.

Full text
Abstract:
Abstract The accurate measurement of sub-zone pressures is crucial for monitoring the performance of reservoirs in gas fields. However, this can be challenging due to the commingled flow of multiple reservoirs and sub-zones within a single well. In this study, we evaluated the use of Production Logging (PLT) and Selective Inflow Performance (SIP) workflows for computing sub-layer pressure in carbonate reservoirs in Pakistan. The study was conducted on carbonate reservoirs located in Pakistan. The usual wells are vertical and have numerous perforations, resulting in combined production across multiple reservoirs and sub-zones. To determine the pressure of a specific sublayer, Production Logging (PLT) was carried out to collect data at various choke sizes. The data was then analyzed through Selective Inflow Performance (SIP) workflow. The Rawlins and Schell-Hardt equation was used to plot the relationship between flow rate and pressure, enabling analysts to match the trendline with the acquired data points. The proposed analysis revealed that at least three different chokes should be tested during PLT logging to ensure accurate results. In addition, for accurate analysis it is preferred that a single-phase fluid is flowing at high flow rates, to be able to detect contrasts between inflows from different zones. In Case-1 SIP workflows were applied on two independent reservoirs with multiple sub-zone entries and found that Reservoir-1 had a current pressure of around 1480psi, whereas Reservoir-2, which was more depleted, contributing more than 80% to production had a current pressure of around 1050psi. Shutting down the wells showed an estimated crossflow of 0.43 MMSCF/D from one reservoir to another. The results demonstrated a good relationship between PLT estimated flow rates and pressures across all producing sub-zones. In Case-2, it was observed that the highest contributing layer on every choke size became a thief zone in shut-in conditions. Such kind of a reservoir that contain mulitple isolated stringers that are commingled together in the well make it challenging for reservoir management. The successful application of SIP workflow allows to perform pressure time-lapse monitoring and adjust the dynamic model accordingly for future reservoir development. This study highlights the importance of periodically measuring sub-zone pressures for effective reservoir performance monitoring in gas fields.
APA, Harvard, Vancouver, ISO, and other styles
7

Amirov, Marat, Arturo Palomo, Mohammed Omer, and John E. Busteed. "Holistic Approach for Effective Waterflood Management in Complex Reservoir in Middle East." In GOTECH. SPE, 2025. https://doi.org/10.2118/224597-ms.

Full text
Abstract:
Abstract The presence of highly conductive thief zones causes poor volumetric sweep efficiency in waterflooding operations that might result in early water breakthrough and, hence, an increase in water production. Deep-reservoir profile modification is an effective method to force subsequently injected water to divert into low-permeability, oil-rich layers and to improve the sweep efficiency. This chemical water shut-off technology aids conformance control by plugging the high-permeability zones and diverting the fluid to the un-swept portion of the reservoir. This work outlines a four-step holistic approach of identifying the conformance candidates and designing an optimal chemical to seal off highly conductive zones and divert the water to un-swept portion of the reservoir. Economic and technical success of conformance jobs is based on successful implementation of the improved workflow demonstrated in this work. A chemical treatment was customized to cross-link and permanently seal specific sections with any direct paths to nearby producers and allow a uniform distribution of injected water along the injection profile along the lateral. Production logging tool (PLT) data was used to identify the section with highest injectivity. The cross-linking time and pumping volume was designed once the zone was identified. Coiled tubing application allows operators to reach deep zones, horizontal sections, and pump chemical treatment selectively in required zone/interval providing an efficient sealing of highly conductive zones. The engineered chemical treatment was injected form a protective ring in the formation with around 4 ft diameter. This will allow the injected water to migrate uniformly to other zones with lower injectivity rates and hence increase the sweep efficiency. The holistic approach proved effective in enhancing the sweep efficiency. The flowrate of the well post operation was similar to pre-operation confirming good injectivity in the desired sections. A long-term monitoring program needs to be established to evaluate the water shut-off performance for future field development and planning. We expect an incremental hydrocarbon recovery by 5-10% oil OOIP (original oil in place). The production data has proved the effectiveness of chemical treatment as an effective solution to enhance sweep efficiency of waterflood operations in terms of safety, economics, and operation. The novelty of this work like in its unique four-step holistic approach from identification to placement which allowed to inject the chemical treatment in required zone and avoid blocking other zone of interest. Coiled tubing application allowed to save considerable operational costs. Successful execution was achieved by integrated water management, strategic planning and technological innovation. This will play a crucial role in controlling lifecycle costs. Early planning is crucial to the success of water management. This technique does not require mechanically sealing off the perforations, making it more feasible for future well interventions.
APA, Harvard, Vancouver, ISO, and other styles
8

AlSayed Omar, F., M. Ibrahim, S. Pullanikkottil, et al. "Advanced Lost Circulation Solution: A Highly Thixotropic Cement System Pumped through BHA for Efficient Lost Circulation Management." In APOGCE 2024. SPE, 2024. http://dx.doi.org/10.2118/221257-ms.

Full text
Abstract:
Abstract Lost circulation is a major challenge in well drilling and can cause well instability, increased costs, or even well abandonment. Many methods have been tried to deal with this problem, but it remains a serious issue worldwide. The goal is to address various lost circulation scenarios in drilling operations and reduce non-productive time, which will improve rig efficiency and well economics. The Advanced Lost Circulation System has many technical advantages over conventional slurries for loss circulation control and offers a more effective solution to overcome this challenge in drilling wells. A conventional cement plug operation can take up to 48 hours to finish, including trip time, WOC and other steps. Sometimes, multiple plugs are needed, which increases the non-productive time. The Advanced Lost Circulation System is a better alternative that can be pumped through the BHA and can reduce the nonproductive time to as low as 6 hours per job. Advanced Lost Circulation System is specially designed to stop losses while drilling, ranging from seepage to total losses. It has low solids and rheology during pumping, which allows it to penetrate deep into the loss zones and form a gel when the shear rate drops. The gel has high static gel strength and early compressive strength, which helps to seal the thief zones, prevent further losses, and prepares the wellbore for primary cementation. Advanced Lost Circulation System has a low density (~10 lb/gal), a low sensitivity to temperature changes, and compatible with both water and oil-based drilling fluids. The Advanced Lost Circulation System is also acid soluble. The study investigated the properties and performance of the Advanced Lost Circulation System, a slurry that exhibits high thixotropy and re-pumpability. The slurry was designed to overcome the challenges of lost circulation. The laboratory tests showed that the slurry could rapidly gel when the shear stress was reduced and resume its fluidity when the shear stress was increased. The field trial demonstrated that the Advanced Lost Circulation System successfully cured the lost circulation zones and enabled a primary cementing job of an intermediate casing with good zonal isolation and casing protection. The cement reached the surface and the CBL confirmed the quality of the cement sheath. The study proved that the Advanced Lost Circulation System is an effective solution for lost circulation problems in oil and gas wells. Lost circulation can cause significant economic losses due to wasted mud, extra rig time, fluid system adjustments, additional materials, and possible well abandonment or sidetracking. The Advanced Lost Circulation System has technical advantages over conventional systems to address all above. It can create a low-permeability filter cake that seals fractures and prevents fluid loss. The Advanced Lost Circulation System can also improve drilling efficiency and performance by reducing torque and drag, enhancing hole cleaning, and stabilizing the wellbore. The Advanced Lost Circulation System is a cost-effective and reliable solution for drilling operations that face lost circulation challenges.
APA, Harvard, Vancouver, ISO, and other styles
9

Aklefa, Amad, Muamer Emhemed, Ayoub Sherik, Mohamed Ben Abdalla, and Siraj Sadeg. "Electrical Coiled Tubing N2 Lifting Enabled Successful HT Production Logging and WSO Campaign." In SPE/ICoTA Well Intervention Conference and Exhibition. SPE, 2024. http://dx.doi.org/10.2118/218298-ms.

Full text
Abstract:
Abstract Many deep high-temperature (HT) wells of Bu Attifel field, Libya, have died in the past years due to increasing water cut. The lack of artificial lift, issues in the water injection system, and unavailability of workover rigs led to significant oil production loss. Nitrogen (N2) kickoff was attempted several times without success, indicating the need for water shutoff (WSO) procedures. Moreover, production logging (PL) was not feasible at the time as wells were dead, and casedhole saturation logs were proven to be unreliable due to static crossflow between layers (presence of thief zones where reservoir fluid is produced by a high-pressure layer and taken by a lower-pressure layer while the well in shut-in/static condition) and reinvasion phenomena. Due to these challenges, it was suggested to use N2 lifting to assist PL in dynamic condition to determine the source of water for shutoff. The objective of this project was to kick off the wells with N2 using electrical coiled tubing (e-coil) with PL tools attached to the e-coil bottomhole assembly. Once the well was restored to a predefined water cut, the logging was performed at different N2 injection rates. This was done regardless of well stabilization (i.e., to have downhole and surface parameters stabilized within 0.5% as per the operator's standard) because the presence of N2 along the entire production string affects the flow regime and does not allow the well to fully stabilize as per the operator's standard. Then, the logging was performed again during the transition period when the N2 pump was switched off. This step was important to prove that injecting N2 near PL tools did not affect data quality. A multiphase meter was also available to monitor cleaning up during N2 kickoff. A high-pressure/high-temperature (HP/HT) tool was used because the bottomhole temperature was over 315°F. Special kickoff and logging steps were taken to insure reliability of measurements and safety of tools and operation. Four wells were logged successfully with HP/HT PL while N2 lifting. Good-quality data were collected, which aided successful water shutoff decisions adding a production gain of more than 4,000 B/D. In the first well, three flowing surveys were performed. The first survey was at high N2 injection rate to accelerate the cleanup and achieve higher flow rates for better PL data. The second was at the minimum N2 injection rate to acquire most reliable data, and the third survey was taken when the N2 pump was switched off to verify that the N2 injection did not affect PL data quality. Comparisons suggest that data were repeating and consistent, especially the downpasses as the tool was moving in the opposite direction to the flow of N2. Special logging procedures, accurate job planning such as for N2 quantities, and logging tool design, among other factors, allowed acquisition of three PL surveys safely in a single run in 9 days after a long cleanup in high-temperature condition. This project describes the thorough prejob design where all aspects of N2 kickoff, logging tools, and procedures were carefully and intensively studied, enabling 9 days of continuous logging in high-temperature condition. The integrated approach involving multidisciplinary services and utilizing advanced technologies led to a smooth operation and turned a challenging procedure into normal practice in this field.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography