LEADER 05073oam 2200565 450 001 9910828662803321 005 20170523091546.0 010 $a1-299-47288-5 010 $a0-12-386546-8 035 $a(OCoLC)841296183 035 $a(MiFhGG)GVRL8CVN 035 $a(EXLCZ)992550000001019801 100 $a20140423d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aEnhanced oil recovery field case studies /$fJames J. Sheng 210 $aWaltham, Mass. $cElsevier$d2013 210 1$aWaltham, MA :$cGulf Professional Publishing,$d2013. 215 $a1 online resource (xxiii, 685 pages) $cillustrations (some color) 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a0-12-386545-X 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Enhanced Oil Recovery Field Case Studies; Copyright Page; Contents; Preface; Contributors; Acknowledgments; 1 Gas Flooding; 1.1 What Is Gas Flooding?; 1.2 Gas Flood Design; 1.3 Technical and Economic Screening Process; 1.4 Gas Injection Design and WAG; 1.5 Phase Behavior; 1.5.1 Standard (or Basic) PVT Data; 1.5.2 Swelling Test; 1.5.3 Slim-Tube Test; 1.5.4 Multicontact Test; 1.5.5 Fluid Characterization Using an Equation-of-State; 1.6 MMP and Displacement Mechanisms; 1.6.1 Simplified Ternary Representation of Displacement Mechanisms 327 $a1.6.2 Displacement Mechanisms for Field Gas Floods1.6.3 Determination of MMP; 1.7 Field Cases; 1.7.1 Slaughter Estate Unit CO2 Flood; 1.7.2 Immiscible Weeks Island Gravity Stable CO2 Flood; 1.7.3 Jay Little Escambia Creek Nitrogen Flood; 1.7.4 Overview of Field Experience; 1.8 Concluding Remarks; Abbreviations; References; 2 Enhanced Oil Recovery by Using CO2 Foams: Fundamentals and Field Applications; 2.1 Foam Fundamentals; 2.1.1 Why CO2 Is so Popular in Recent Years?; 2.1.2 Why CO2 Is of Interest Compared to Other Gases?; 2.1.3 Why CO2 Is Injected as Foams? 327 $a2.1.4 Foam in Porous Media: Creation and Coalescence Mechanisms2.1.5 Foam in Porous Media: Three Foam States and Foam Generation; 2.1.6 Foam in Porous Media: Two Strong-Foam Regimes-High-Quality and Low-Quality Regimes; 2.1.7 Modeling Foams in Porous Media; 2.1.8 Foam Injection Methods and Gravity Segregation; 2.1.9 CO2-Foam Coreflood Experiments; 2.1.10 Effect of Subsurface Heterogeneity-Limiting Capillary Pressure and Limiting Water Saturation; 2.1.11 Foam-Oil Interactions; 2.2 Foam Field Applications; 2.2.1 The First Foam Field Applications, Siggins Field, Illinois 327 $a2.2.2 Steam Foam EOR, Midway Sunset Field, California2.2.3 CO2/N2 Foam Injection in Wilmington, California (1984); 2.2.4 CO2-Foam Injection in Rock Creek, Virginia (1984-1985); 2.2.5 CO2-Foam Injection in Rangely Weber Sand Unit, Colorado (1988-1990); 2.2.6 CO2-Foam Injection in North Ward-Estes, Texas (1990-1991); 2.2.7 CO2-Foam Injection in the East Vacuum Grayburg/San Andres Unit, New Mexico (1991-1993); 2.2.8 CO2-Foam Injection in East Mallet Unit, Texas, and McElmo Creek Unit, Utah (1991-1994); 2.3 Typical Field Responses During CO2-Foam Applications 327 $a2.3.1 Diversion from High- to Low-Permeability Layers2.3.2 Typical Responses from Successful SAG Processes; 2.3.3 Typical Responses from Successful Surfactant-Gas Coinjection Processes; 2.4 Conclusions; Acknowledgment; Appendix-Expression of Gas-Mobility Reduction in the Presence of Foams; References; 3 Polymer Flooding-Fundamentals and Field Cases; 3.1 Polymers Classification; 3.2 Polymer Solution Viscosity; 3.2.1 Salinity and Concentration Effects; 3.2.2 Shear Effect; 3.2.3 pH Effect; 3.3 Polymer Flow Behavior in Porous Media; 3.3.1 Polymer Viscosity in Porous Media; 3.3.2 Polymer Retention 327 $a3.3.3 Inaccessible Pore Volume 330 $a Enhanced Oil Recovery Field Case Studies bridges the gap between theory and practice in a range of real-world EOR settings. Areas covered include steam and polymer flooding, use of foam, in situ combustion, microorganisms, ""smart water""-based EOR in carbonates and sandstones, and many more. Oil industry professionals know that the key to a successful enhanced oil recovery project lies in anticipating the differences between plans and the realities found in the field. This book aids that effort, providing valuable case studies from more than 250 EOR pilot and field applicatio 606 $aEnhanced oil recovery 606 $aPetroleum engineering 606 $aOil reservoir engineering 606 $aOil fields$xProduction methods 615 0$aEnhanced oil recovery. 615 0$aPetroleum engineering. 615 0$aOil reservoir engineering. 615 0$aOil fields$xProduction methods. 676 $a622.33827 700 $aSheng$b James J$01719513 702 $aSheng$b James 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910828662803321 996 $aEnhanced oil recovery field case studies$94117417 997 $aUNINA LEADER 04567nam 22007575 450 001 9910298989003321 005 20200703223528.0 010 $a3-319-07356-7 024 7 $a10.1007/978-3-319-07356-9 035 $a(CKB)3710000000125836 035 $a(EBL)1783038 035 $a(SSID)ssj0001274323 035 $a(PQKBManifestationID)11749270 035 $a(PQKBTitleCode)TC0001274323 035 $a(PQKBWorkID)11326246 035 $a(PQKB)10197109 035 $a(MiAaPQ)EBC1783038 035 $a(DE-He213)978-3-319-07356-9 035 $a(PPN)179764357 035 $a(EXLCZ)993710000000125836 100 $a20140609d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPervasive Wireless Environments: Detecting and Localizing User Spoofing /$fby Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (79 p.) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $aDescription based upon print version of record. 311 $a1-322-13652-1 311 $a3-319-07355-9 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntroduction -- Feasibility of Launching User Spoofing -- Attack Detection Model -- Detection and Localizing Multiple Spoofing Attackers.-Detecting Mobile Agents Using Identity Fraud -- Related Work -- Conclusions and Future Work. 330 $aThis Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device?s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security. 410 0$aSpringerBriefs in Computer Science,$x2191-5768 606 $aComputer security 606 $aComputer networks 606 $aComputers 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer networks. 615 0$aComputers. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aInformation Systems and Communication Service. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 700 $aYang$b Jie$4aut$4http://id.loc.gov/vocabulary/relators/aut$0859922 702 $aChen$b Yingying$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTrappe$b Wade$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aCheng$b Jerry$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298989003321 996 $aPervasive Wireless Environments: Detecting and Localizing User Spoofing$91918836 997 $aUNINA