Visualization of subsurface geology is mainly considered as the framework of the required structure to provide distribution of petrophysical properties. The geological model helps to understand the behavior of the fluid flow in the porous media that is affected by heterogeneity of the reservoir and helps in calculating the initial oil in place as well as selecting accurate new well location. In this study, a geological model is built for Qaiyarah field, tertiary reservoir, relying on well data from 48 wells, including the location of wells, formation tops and contour map. The structural model is constructed for the tertiary reservoir, which is an asymmetrical anticline consisting of two domes separated by a saddle. It is found that the three formations in the tertiary reservoir is composed of limestone and dolomitic limestone with very thin shale rims introduced only in the Dhiban Formation, which have the minimum thickness compared to the main other two formations those considered the main reservoir units. Upscaling from the software has been used to distribute and correlate between the logs and core data, which came very acceptable results to be used for distribution to the entire field. Both log analysis and core data have showed that the reservoir is clean formation, no volume of shale has considered in the STIIOP calculations with average water saturation calculated to be 31.5% and average porosity of approximately 22% with temperature gradient of 1.2 °F/100 ft. This comes up with Stock Tank Initial Oil in Place calculated to be 6.519*109.
In this paper, the exact solutions of the Schlömilch’s integral equation and its linear and non-linear generalized formulas with application are solved by using two efficient iterative methods. The Schlömilch’s integral equations have many applications in atmospheric, terrestrial physics and ionospheric problems. They describe the density profile of electrons from the ionospheric for awry occurrence of the quasi-transverse approximations. The paper aims to discuss these issues.
First, the authors apply a regularization meth
Glaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma d
Visual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu
... Show MoreAn Optimal Algorithm for HTML Page Building Process
The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show More