您要查找的是不是:
- A shale formation with sandstone interbedded is also a potential oil bearing formation. 以泥岩为主,夹砂岩的地层也可能是油气层。
- During the stabilized foam drilling in shale formation,an inhibitive is often added into the circulating fluid to prevent wellbore collapsing and stick. 在泥页岩地层进行稳定泡沫钻井施工时,为防止地层坍塌和卡钻,通常在循环流体中要加入抑制剂。
- The relative compaction trend line is established to determine supercharged shale zone according to the relationship between the depth of shale formation and acoustic slowness. 通过声波时差和自然伽马能谱资料分析泥岩裂缝的储存能力,并利用纯泥岩地层的深度与声波时差的关系,建立相对正常压实趋势线,判断泥岩超压层。
- Its basement is mainly composed of Paleozoic epimetamorphic rocks and the cover mostly consists of Cretaceous graywacke and organic shale formation,as well as Cenozoic loose elastic accumulations. 笔者通过对前人资料分析研究后认为:松辽盆地具有良好的成矿地质条件和找矿前景;
- The new process extracts oil from shale. 这一新过程可从页岩里提炼出石油。
- Most of the rock in this mountain is shale. 这座山上大部分的岩石都是页岩。
- A Method for Determining the Critical Time of Wellbore Instability at Water-sensitive Shale Formations 水敏性泥页岩地层临界坍塌时间的确定方法
- There are several kinds of cloud formations. 云层的构成方式有好几种。
- Modeling and Extracting Solutions of Water-irons Permeability Law in Shale Formations 页岩地层中水与离子渗透规律的建模与求解
- The book has been styled in a modern format. 该书已按照现代版式制作。
- The book is written in an episodic format. 这本书是以一种松散的形式写成的。
- It's the same book, but a new format. 还是那本书,但这是新的版式。
- shale formations 硬脆性泥页岩
- Keywords water base drilling fluids;formulations/compositions;inhibitive drilling fluids;polymer/sulfonate drilling fluids;shale formations;bore-hole stabilization;methods and Techniques;Review; 水基钻井液;配方组合;抑制性钻井液;聚磺钻井液;硬脆性泥页岩;井壁稳定;测试方法;综述;
- North America has vast deposits of shale. 北美有大量油页岩沉积。
- The sandstone and shale units are of the same age. 砂岩和页岩单元是同时的。
- The time of expulsion from this shale is uncertain. 该页岩的排烃时间不太确定。
- To protrude above the soil, as rock formations. 露出地表(如岩石形成物)伸出地表
- Can you make this shale shaker work? 你能使这台振动筛工作吗?
- The attack is to wipe out data, to delete flies, or to format the hard disk. 常见的攻击方式是消除数据、删除文件或者格式化硬盘。