Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and anomalous rock faces. Furthermore, the paper explores the adoption of advanced methods, including hydraulic flow units (HFU), providing a fine-grained understanding of reservoir heterogeneity and contributing to the prediction of flow dynamics. The final section includes structural geological models, petrophysical data collected, rock type classification, and spatial data to better represent the reservoir bottom structure. It provides a valuable resource for researchers, geologists, and engineers seeking to characterize reservoirs and make optimal decisions on hydrocarbon exploration and production. It is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling.
Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreIraq is changing from the centralized system of governance to the decentralized system, which assumes devolution of more authorities to the local governments of Iraqi provinces and cities. This puts a responsibility on the academics to produce more research work on the best framework for this change, to ensure the best results. The main objective of this research is to suggest a policy for the decentralized transformation in domain of Urban and Regional Planning in Iraq. A suggested program for the transformation is involved in the paper as well, with analysis for the new relationships between different levels of planning authorities depending on democracy. In addition, a description for planning process flows from bottom to top.
Background: Neonatal seizures are the most common neurological emergency in newborns, often associated with significant mortality and long-term neurodevelopmental disabilities. The aim is to determine the incidence, etiological causes, and risk factors associated with neonatal seizures.Patients and Methods: This prospective case-control study was conducted over eight months, from January 1 to August 31, 2022, the study was conducted at the neonatal care unit of Children Welfare Teaching Hospital. Neonates who developed clinically recognizable seizures before 28 days of life in term infants, or up to 44 weeks corrected gestational age in preterm infants, were included. Data collection involved demographic information, prenatal, perin
... Show MoreAlthough the axial aptitude and pile load transfer under static loading have been extensively documented, the dynamic axial reaction, on the other hand, requires further investigation. During a seismic event, the pile load applied may increase, while the soil load carrying capacity may decrease due to the shaking, resulting in additional settlement. The researchers concentrated their efforts on determining the cause of extensive damage to the piles after the seismic event. Such failures were linked to discontinuities in the subsoil due to abrupt differences in soil stiffness, and so actions were called kinematic impact of the earthquake on piles depending on the outcomes of laboratory
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The personal drama in particular, and one of the key elements underlying the dramatic structure to convey ideas and visions presented by the author when writing the text of the dramatic fall after that on the way out the submission form that suits the proposals of the text and processors directorial would push the wheel of dramatic structure to the front. So take the maker of the artwork (writer) undertook the transfer of those events and personalities in art presumed sometimes real and sometimes, in order to enrich the art inspired by the human reality through the ages, and full of its themes and ideas that led to the development experiences of peoples experiences of living. Therefore, we find it important to research in the characters
... Show Morexxxxxx
The one-dimensional, spherical coordinate, non-linear partial differential equation of transient heat conduction through a hollow spherical thermal insulation material of a thermal conductivity temperature dependent property proposed by an available empirical function is solved analytically using Kirchhoff’s transformation. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner radius with a step change in temperature. Four thermal insulation materials were selected. An identical analytical solution was achieved when comparing the results of temperature distribution with available analytical solution for the same four case studies that assume a constant thermal con
... Show More