Three-dimensional geological modeling of reservoirs is an essential tool to predict reservoir performance and improve the understanding of reservoir uniqueness in Es1 formation. The paper focuses on the use of petrel ...Three-dimensional geological modeling of reservoirs is an essential tool to predict reservoir performance and improve the understanding of reservoir uniqueness in Es1 formation. The paper focuses on the use of petrel software to build three-dimensional reservoir geological model which characterizes and assesses block Nv32 that located in the west of the Shenvsi oilfield in the south of Cangzhou city, Hebei province of China, and has an oil-bearing area of 1.4 km<sup>2</sup>. This study is depending on integration data from well logs of 22 wells which provided from geology, geophysics, and petrophysics to identify and provide precise depict of the subsurface internal structure and the reservoir heterogeneity. Input data was used to build the structural model, sedimentary facies model, petrophysical properties (porosity, permeability, saturation, and N/G model, and finally to determine the reservoir volume. The lithological facies were simulated using the assigned value method. Moreover, Petrophysical properties (Porosity, permeability, oil saturation and net to gross) were constructed for each zone using the Sequential Gaussian Simulation method to guide the distribution of petrophysical properties of Es1 formation, block Nv32. Statistical analysis of the porosity, permeability, oil saturation and N/G model present that the porosity occurrence distribution is mainly concern between 0.2% - 36.39% of block Nv32 with an average porosity value of 17.5%, permeability between 0.017 mD to 974.8 mD, having an average permeability of 59.44 mD, oil saturation between 0.00 to 0.95 having an average value of 0.22, and N/G is mainly concentrated between 0.01 to 1.00 within an average value of 0.61. This research has indicated the reliability of the three-dimensional model technique as a suitable tool to provide a sufficient understanding of petrophysical distribution. The south-western and north-western indicate that oilfield is very promising an exploratory well should be drilled to find out the thickness and size of the reservoir.展开更多
This study aims to further enhance the oil recovery of reservoirs in the Zhong-2 Block of the Gudao Oilfield by identifying the most effective microbial-flooding activator systems and applying them in the field.We beg...This study aims to further enhance the oil recovery of reservoirs in the Zhong-2 Block of the Gudao Oilfield by identifying the most effective microbial-flooding activator systems and applying them in the field.We began by analyzing the structure of the reservoirs'endogenous microbial communities to understand the potential impact of microbial flooding.This was followed by determining commonly used activator systems based on their abilities to stimulate oil-displacement functional bacteria.Through laboratory experiments on oil displacement efficiency and sweep characteristics,we determined the optimal activator injection method(injection ratio)and the requisite bacterial concentration for maximal microbial-flooding efficacy.Finally,we selected the optimal activator systems and applied them to field tests.Our findings suggest the target block is highly receptive to microbial-flooding.In terms of performance,the activator systems ranked as No.3>No.4>No.1>No.2.Interestingly,a deep activator system,when compared to the top-performing No.3 system,exhibited a higher bacterial concentration peak and longer peaking duration.Optimal oil displacement effects were observed at a 1:4 vol ratio between the No.3 activator and deep activator systems,with bacterial concentrations of up to 106 cells/mL or above.Field tests with the selected activator systems,following a specific injection protocol,demonstrated a notable increase in oil production and a reduction in water cut.展开更多
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same...We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.展开更多
The quantum security of lightweight block ciphers is receiving more and more attention.However,the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search,while the quantum ...The quantum security of lightweight block ciphers is receiving more and more attention.However,the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search,while the quantum attacks combined with classical cryptanalysis methods haven’t been well studied.In this paper,we study quantum key recovery attack on SIMON32/64 using Quantum Amplitude Amplification algorithm in Q1 model.At first,we reanalyze the quantum circuit complexity of quantum exhaustive search on SIMON32/64.We estimate the Clifford gates count more accurately and reduce the T gate count.Also,the T-depth and full depth is reduced due to our minor modifications.Then,using four differentials given by Biryukov in FSE 2014 as our distinguisher,we give our quantum key recovery attack on 19-round SIMON32/64.We treat the two phases of key recovery attack as two QAA instances separately,and the first QAA instance consists of four sub-QAA instances.Then,we design the quantum circuit of these two QAA instances and estimate their corresponding quantum circuit complexity.We conclude that the quantum circuit of our quantum key recovery attack is lower than quantum exhaustive search.Our work firstly studies the quantum dedicated attack on SIMON32/64.And this is the first work to study the complexity of quantum dedicated attacks from the perspective of quantum circuit complexity,which is a more fine-grained analysis of quantum dedicated attacks’complexity.展开更多
文摘Three-dimensional geological modeling of reservoirs is an essential tool to predict reservoir performance and improve the understanding of reservoir uniqueness in Es1 formation. The paper focuses on the use of petrel software to build three-dimensional reservoir geological model which characterizes and assesses block Nv32 that located in the west of the Shenvsi oilfield in the south of Cangzhou city, Hebei province of China, and has an oil-bearing area of 1.4 km<sup>2</sup>. This study is depending on integration data from well logs of 22 wells which provided from geology, geophysics, and petrophysics to identify and provide precise depict of the subsurface internal structure and the reservoir heterogeneity. Input data was used to build the structural model, sedimentary facies model, petrophysical properties (porosity, permeability, saturation, and N/G model, and finally to determine the reservoir volume. The lithological facies were simulated using the assigned value method. Moreover, Petrophysical properties (Porosity, permeability, oil saturation and net to gross) were constructed for each zone using the Sequential Gaussian Simulation method to guide the distribution of petrophysical properties of Es1 formation, block Nv32. Statistical analysis of the porosity, permeability, oil saturation and N/G model present that the porosity occurrence distribution is mainly concern between 0.2% - 36.39% of block Nv32 with an average porosity value of 17.5%, permeability between 0.017 mD to 974.8 mD, having an average permeability of 59.44 mD, oil saturation between 0.00 to 0.95 having an average value of 0.22, and N/G is mainly concentrated between 0.01 to 1.00 within an average value of 0.61. This research has indicated the reliability of the three-dimensional model technique as a suitable tool to provide a sufficient understanding of petrophysical distribution. The south-western and north-western indicate that oilfield is very promising an exploratory well should be drilled to find out the thickness and size of the reservoir.
基金funded by the National Natural Science Foun-dation of China(No.51974343)the China Postdoctoral Science Foundation(No.2021M703588)the Open Fund of Hubei Key Laboratory of Drilling and Production Engineering for Oil and Gas(Yangtze University)(No.YQZC202307).
文摘This study aims to further enhance the oil recovery of reservoirs in the Zhong-2 Block of the Gudao Oilfield by identifying the most effective microbial-flooding activator systems and applying them in the field.We began by analyzing the structure of the reservoirs'endogenous microbial communities to understand the potential impact of microbial flooding.This was followed by determining commonly used activator systems based on their abilities to stimulate oil-displacement functional bacteria.Through laboratory experiments on oil displacement efficiency and sweep characteristics,we determined the optimal activator injection method(injection ratio)and the requisite bacterial concentration for maximal microbial-flooding efficacy.Finally,we selected the optimal activator systems and applied them to field tests.Our findings suggest the target block is highly receptive to microbial-flooding.In terms of performance,the activator systems ranked as No.3>No.4>No.1>No.2.Interestingly,a deep activator system,when compared to the top-performing No.3 system,exhibited a higher bacterial concentration peak and longer peaking duration.Optimal oil displacement effects were observed at a 1:4 vol ratio between the No.3 activator and deep activator systems,with bacterial concentrations of up to 106 cells/mL or above.Field tests with the selected activator systems,following a specific injection protocol,demonstrated a notable increase in oil production and a reduction in water cut.
基金the National Natural Science Foundation of China (No. 61272434)the Natural Science Foundation of Shandong Province (Nos. ZR2011FQ032 and ZR2012FM004)+1 种基金the Project of Shandong Province Higher Educational Science and Technology Program(No. J11LG33)the Project of Senior Visiting Scholar of Shandong Province
文摘We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.
基金National Natural Science Foundation of China(Grant No.61672517)National Natural Foundation of China(Key program,Grant No.61732021)+1 种基金National Cyrptography Development Fund(Grant No.MMJJ20170108)Beijing Municipal Science&Technology Commission(Grant No.Z191100007119006).
文摘The quantum security of lightweight block ciphers is receiving more and more attention.However,the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search,while the quantum attacks combined with classical cryptanalysis methods haven’t been well studied.In this paper,we study quantum key recovery attack on SIMON32/64 using Quantum Amplitude Amplification algorithm in Q1 model.At first,we reanalyze the quantum circuit complexity of quantum exhaustive search on SIMON32/64.We estimate the Clifford gates count more accurately and reduce the T gate count.Also,the T-depth and full depth is reduced due to our minor modifications.Then,using four differentials given by Biryukov in FSE 2014 as our distinguisher,we give our quantum key recovery attack on 19-round SIMON32/64.We treat the two phases of key recovery attack as two QAA instances separately,and the first QAA instance consists of four sub-QAA instances.Then,we design the quantum circuit of these two QAA instances and estimate their corresponding quantum circuit complexity.We conclude that the quantum circuit of our quantum key recovery attack is lower than quantum exhaustive search.Our work firstly studies the quantum dedicated attack on SIMON32/64.And this is the first work to study the complexity of quantum dedicated attacks from the perspective of quantum circuit complexity,which is a more fine-grained analysis of quantum dedicated attacks’complexity.