Preferred Language
Articles
/
gxaIS4kBVTCNdQwCrohN
A Survey of Infill Well Location Optimization Techniques

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Following that, the research looked at a variety of different optimization strategies, and it demonstrated the limitations of each strategy as well as the scope of its application in order to achieve a suitable level of accuracy and simulation run time. In conclusion, this study presents an all-encompassing analysis of the well location optimization approaches that are applied in the petroleum engineering area, ranging from traditional methods to contemporary methods that make use of artificial intelligence.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
An Integrated Microfacies and Well Logs-Based Reservoir Characterization of Yamama Formation, Southern Iraq

     The Yamama Formation includes important carbonates reservoir that belongs to the Lower Cretaceous sequence in Southern Iraq. This study covers two oil fields (Sindbad and Siba) that are distributed Southeastern Basrah Governorate, South of Iraq. Yamama reservoir units were determined based on the study of cores, well logs, and petrographic examination of thin sections that required a detailed integration of geological data and petrophysical properties. These parameters were integrated in order to divide the Yamama Formation into six reservoir units (YA0, YA1, YA2, YB1, YB2 and YC), located between five cap rock units. The best facies association and petrophysical properties were found in the shoal environment, wh

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Oct 29 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
A Survey of Diabetes Mellitus in a Sample of Children below 15 Years Attending Child Welfare Hospital

Objectives: Determine the age and gender distribution of children who experience diabetes mellitus (DM) under
the age of 15 years and the presence of some associated factors that might be a predisposing factor for the
disease including obesity.
Methodology: A cross-sectional study was conducted at diabetic clinic in Children Welfare Teaching Hospital
in Baghdad City during 2006. The study sample included diabetic children less than 15 years of age. Data were
taken from the patients' record and by direct interview with the patients' parents. Information included
demographic data, as well as past history of the patient and his/her family relative to diabetes and other immune
diseases.
Results: Data analysis showed t

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Inverse Kinematics Optimization for Humanoid Robotic Legs Based on Particle Swarm Optimization

Calculating the Inverse Kinematic (IK) equations is a complex problem due to the nonlinearity of these equations. Choosing the end effector orientation affects the reach of the target location. The Forward Kinematics (FK) of Humanoid Robotic Legs (HRL) is determined by using DenavitHartenberg (DH) method. The HRL has two legs with five Degrees of Freedom (DoF) each. The paper proposes using a Particle Swarm Optimization (PSO) algorithm to optimize the best orientation angle of the end effector of HRL. The selected orientation angle is used to solve the IK equations to reach the target location with minimum error. The performance of the proposed method is measured by six scenarios with different simulated positions of the legs. The proposed

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
Arabian Journal Of Geosciences
Effect of well scheduling and pattern on project development management in unconventional tight gas reservoirs

The advancements in horizontal drilling combined with hydraulic fracturing have been historically proven as the most viable technologies in the exploitation of unconventional resources (e.g., shale and tight gas reservoirs). However, the number of fractures, well timing, and arrangement pattern can have a significant impact on the project economy. Therefore, such design and operating parameters need to be efficiently optimized for obtaining the best production performance from unconventional gas reservoirs. In this study, the process of selecting the optimal number of fractures was conducted on a section of a tight gas reservoir model (based on data from the Whicher Range (WR) tight gas field in Western Australia). Then, the optimal number

... Show More
Crossref (1)
Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Optimal Economic Design of Diversion Structures during Construction of a Dam by Particle Swarm Optimization

Diverting river flow during construction of a main dam involves the construction of cofferdams, and tunnels, channels or other temporary passages. Diversion channels are commonly used in wide valleys where the high flow makes tunnels or culverts uneconomic. The diversion works must form part of the overall project design since it will have a major impact on its cost, as well as on the design, construction program and overall cost of the permanent works. Construction costs contain of excavation, lining of the channel, and construction of upstream and downstream cofferdams. The optimization model was applied to obtain optimalchannel cross section, height of upstream cofferdam, and height of downstream cofferdamwith minimum construction cost

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
Scopus (2)
Scopus
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
Crossref (1)
Crossref
View Publication
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
Crossref (1)
Crossref
View Publication