Scale Effects and Field Applications for Continuous Intrusion Miniature Cone Penetrometer

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

simulation and experimental studies for prediction mineral scale formation in oil field during mixing of injection and formation water

abstract: mineral scaling in oil and gas production equipment is one of the most important problem that occurs while water injection and it has been recognized to be a major operational problem. the incompatibility between injected and formation waters may result in inorganic scale precipitation in the equipment and reservoir and then reduction of oil production rate and water injection rate. ...

A Dynamic Cone Penetrometer for Measuring Soil Penetration Resistance

ters to characterize both agricultural and rangeland A DYNAMIC CONE PENETROMETER soils, however, has been limited by concerns about (i) FOR MEASURING SOIL instrument cost, (ii) measurement repeatability, (iii) limited ranges of soil resistance that can be measured by PENETRATION RESISTANCE a single penetrometer, and (iv) difficulties in comparing Jeffrey E. Herrick* and Tim L. Jones data collec...

متن کامل

Near-surface VSP surveys using the seismic cone penetrometer

We have found that high-quality vertical seismic profile (VSP) data can be collected for near-surface applications using the seismic cone penetrometer. Conemounted accelerometers are used as the VSP receivers, and a sledgehammer against the cone truck baseplate is used as a source. This technique eliminates the need to drill a borehole, thereby reducing the cost of the survey, and results in a ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korean Society of Civil Engineers

سال: 2013

ISSN: 1015-6348,2287-934X

DOI: 10.12652/ksce.2013.33.6.2359