Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and anomalous rock faces. Furthermore, the paper explores the adoption of advanced methods, including hydraulic flow units (HFU), providing a fine-grained understanding of reservoir heterogeneity and contributing to the prediction of flow dynamics. The final section includes structural geological models, petrophysical data collected, rock type classification, and spatial data to better represent the reservoir bottom structure. It provides a valuable resource for researchers, geologists, and engineers seeking to characterize reservoirs and make optimal decisions on hydrocarbon exploration and production. It is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling.
Optimizing the Access Point (AP) deployment is of great importance in wireless applications owing the requirement to provide efficient and cost-effective communication. Highly targeted by many researchers and academic industries, Quality of Service (QOS) is an important primary parameter and objective in mind along with AP placement and overall publishing cost. This study proposes and investigates a multi-level optimization algorithm based on Binary Particle Swarm Optimization (BPSO). It aims to an optimal multi-floor AP placement with effective coverage that makes it more capable of supporting QOS and cost effectiveness. Five pairs (coverage, AP placement) of weights, signal threshol
An efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
Bunium is one of the interested genus that grow in different region of Iraq, it is within the family Umbelliferae (Apiaceae), and the species within this family have a considerable fruit characteristics. The species that were chosen in this study are: B. brachyactis (Post) H. Wolff, B. caroides (Boiss.) Hausskn. Ex Bornm., B. chaerophylloides (Regel& Schmalh.) Drude, B. rectangulum Boiss. & Hausskn., B. verruculosum C.C.Towns. and B. avromanum (Boiss.& Hausskn) Drude., the study found that the fruits of these species have 5 protrusions different in size but all have the same number of vittae, but some are semiler in size and some are not, the number of vascular element are varied between these species, anatomical charact
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreToday we are witnessing huge scientific and technical progress so we need more skills and methods of thinking that needs to be acquired by the teacher, as the importance of computers in education there are many teachers suffering of the difficulty in teaching for pupils . researchers tried to find a good suitable way with the technological interests for now which represent by computer design software and the introduction of enrichment activities in the curriculum because it is one of a contemporary trends for the development of the Arabic language with various levels of education and knowing if this program has negative or positive impact.
So 
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe research, whose goal was to study students' failure in secondary school in Iraq, found that 50% of the Iraqi governorates achieved the lowest student failure rates, and Baghdad governorate had the highest percentage of repeaters. And that half of the provinces in Iraq have males constitute 70% of the repeaters, and failure in the exam represented 79.7% of the reasons for failure, and that half of the students who failed are confined to the first and third intermediate grades at a rate of 51.9% , and the research revealed that the security instability was the most influential factor in Students fai