Preferred Language
Articles
/
gxaIS4kBVTCNdQwCrohN
A Survey of Infill Well Location Optimization Techniques

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Following that, the research looked at a variety of different optimization strategies, and it demonstrated the limitations of each strategy as well as the scope of its application in order to achieve a suitable level of accuracy and simulation run time. In conclusion, this study presents an all-encompassing analysis of the well location optimization approaches that are applied in the petroleum engineering area, ranging from traditional methods to contemporary methods that make use of artificial intelligence.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
Scopus (49)
Crossref (47)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun Apr 12 2009
Journal Name
Journal Of Engineering
Publication Date
Wed Sep 09 2009
Journal Name
University Of Baghdad
Estimation of Reservoir Rock Properties from Well Measurements

Porosity and permeability are the most difficult properties to determine in subsurface reservoir characterization. The difficulty of estimating them arising from the fact that porosity and permeability may vary significantly over the reservoir volume, and can only be sampled at well location. Secondly, the porosity values are commonly evaluated from the well log data, which are usually available from most wells in the reservoir, but permeability values, which are generally determined from core analysis, are not usually available. The aim of this study is: First, to develop correlations between the core and the well log data which can be used to estimate permeability in uncored wells, these correlations enable to estimate reservoir permeabil

... Show More
Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Potability of Well Water in Falluja City ,Iraq.

  The Falluja residents had resorted to the underground water as an alternative to the surface waters of the Euphrates river passing near the city, through digging wells inside gardens of Mosques in the city during spring 2005. The present study aims to indicate the quality of these waters and demonstrates the extent of their suitability for drinking . For this purpose, 21 randomly distributed wells were chosen during August 2005. The water characters were measured ; the average values of 21 wells were as follows : Water temp .(22.6C Ù’ â—Œ ) , EC (4,11 msem .\cm ), pH (7.15 ) and concentration of cations : Na (439mg\l) ;K (275mg\l) ; Li (0,28mg\l), Ba (15.2 mg\l) and (133mg\l). These character is ties were compared with the

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Sciencerise: Pharmaceutical Science
The morphological analysis of crystalline methadone: a novel combination of microscopy techniques

The aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Selection of OptimumRadiant Barrier System (RBS) Location in Double Skin Ventilated Roofs

Double skin ventilated roof is one of the important passive cooling techniques that aims to reduce solar heat gain through roofs by reducing both the conduction and convection heat transfer from the roof to the ceiling of buildings. On the other hand, radiant barrier system (RBS) is very powerful in blocking the radiation heat transfer between the two skins. In this research,the effect of placing a thin layer of aluminium foil at different locations on the thermal insulation performance of a double skin ventilated roof model is investigated experimentally and the optimum location that transmits less heat flux from the lower skinis specified.The model is made of two parallel inclined galvanized steel plates. Galvanized steel has been used

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 29 2013
Journal Name
Wireless Personal Communications
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
A Light Weight Multi-Objective Task Offloading Optimization for Vehicular Fog Computing

Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo

... Show More
Scopus (7)
Crossref (5)
Scopus Crossref
View Publication
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Crawling and Mining the Dark Web: A Survey on Existing and New Approaches

    The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The

... Show More
Scopus (6)
Crossref (6)
Scopus Crossref
View Publication Preview PDF