Optimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementation of each method to gain an appropriate degree of precision and simulation run time. Finally, the paper provides an inclusive review of the well placement optimization methods utilized in the petroleum engineering domain from conventional methods to modern artificial intelligence methods.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThe moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreBackground: Swine influenza (also Called pig influenza, swine flu, hog flu and pig flu) is an infection by any one of several types of swine influenza virus (SIV) or S-OIV (Swine-Origin influenza virus) is any strain of the influenza family of viruses that is endemic in pigs. Patients and Methods:- Ninety patients with there families suspected of swine flu who were admitted to Central Teaching Hospital of Pediatric in Baghdad seventy one from Baghdad Al-Kerkh, twelve from Baghdad Al-Rasafa and seven other Iraqi Governorate (1 in Suleimaniya, 2 in Baquba, 4 in Anbar) they were included in a prospective study started from the 1st October till the 30 th of November 2009. Results:- The study revealed from )90( suspected cases the H1N1 Virus Pos
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show MoreMarriage is a holly secret in Christian religion .So it id natural that its ceremonies acquired religious form .In general the marriage is contracted by minister of religion in presence of the two parties or by a proxy or presence of parents if it is necessary . And to make the condition of publicity for the marriage ,its procedures must be made before witnesses .Also the minister of religionhave to confirm the agreement of the two parties before beginning the procedures.The marriage ceremonies are made.These procedures are religious traditions that includes praying and make blessings and putting the rings in fingers by thepriest . The marriage is a holly secret performed by the crown pray according to the church religious traditions
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreAniera desert/cola was found new to science and to the Iraqi fauna. The description was
mainly based on external features and male genit
Lorraine Hansberry’s A Raisin in the Sun (1959) appeared at the beginning of renewed political activity on the part of the blacks; it is a pamphlet about the dream of recognition of black people and the confusion of purposes and means to reach such recognition. It embodies ideas that have been uncommon on the Broadway stage in any period. Situations such as a black family moving into an all-white neighborhood were not familiar before this time; they were just beginning to emerge. In depicting this so realistically, Hansberry depends more on her personal experience as an African American embittered by social prejudices and discrimination.
The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in