Reservoir characterization plays a crucial role in comprehending the distribution of formation properties and fluids within heterogeneous reservoirs. This knowledge is instrumental in constructing an accurate three-dimensional model of the reservoir, facilitating predictions regarding porosity, permeability, and fluid flow distribution. Among the various methods employed for reservoir characterization, the hydraulic flow unit stands out as a widely adopted approach. By effectively subdividing the reservoir into distinct zones, each characterized by unique petrophysical and geological properties, hydraulic flow units enable comprehensive reservoir analysis. The concept of the flow unit is closely tied to the flow zone indicator, a critical parameter that defines the porosity-permeability relationships of each hydraulic flow unit. Additionally, the flow zone indicator method proves valuable in estimating permeability accurately. In this study, we demonstrate the application of the flow zone indicator method to determine hydraulic flow units within the Khasib formation. By analyzing core data and calculating the Rock Quality Index (RQI) and Flow Zone Indicator (∅Z), we differentiate the formation into four hydraulic flow units based on FZI values. Specifically, HFU 1 represents a rock of poor quality, corresponding to compact and chalky limestone. HFU 2 represents intermediate quality, corresponding to argillaceous limestone, while HFU 3 represents good quality, corresponding to porous limestone. Lastly, HFU 4 signifies an excellent reservoir rock quality characterized by vuggy limestone. By establishing a permeability equation that correlates with effective porosity for each rock type, we successfully estimate permeability. Comparing these estimated permeability values with core permeability reveals a strong agreement with a high correlation coefficient of 0.96%. Consequently, the flow zone indicator method effectively classifies the Khasib formation into four distinct hydraulic flow units and provides an accurate and reliable means of determining permeability in the reservoir. The resulting permeability equations can be applied to wells and depth intervals lacking core measurements, further emphasizing the practical utility of the FZI method.
In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-
... Show Morethe student of the structure of the city and its constituent elements will clearly sense the invisible relationships that underlie the different forms of urban activity, which in turn are defined by the generality of the urban patterns in that city, which will vary clearly according to the location in the city. These relations will be embodied in their true form in the interactions between the different uses of the earth, and the change that will result from their regularity in the form of entities in independent groups, which may share with each other a component of it.
Therefore, the process of controlling the functional interactions between the uses of the urban land and the awareness of t
The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show MoreIn this paper, previous studies about Fuzzy regression had been presented. The fuzzy regression is a generalization of the traditional regression model that formulates a fuzzy environment's relationship to independent and dependent variables. All this can be introduced by non-parametric model, as well as a semi-parametric model. Moreover, results obtained from the previous studies and their conclusions were put forward in this context. So, we suggest a novel method of estimation via new weights instead of the old weights and introduce
Paper Type: Review article.
another suggestion based on artificial neural networks.
ABSTRACT Planetary Nebulae (PN) distances represent the fundamental parameter for the determination the physical properties of the central star of PN. In this paper the distances scale to Planetary Nebulae in the Galactic bulge were calculated re- lated to previous distances scales. The proposed distance scale was done by recalibrated the previous distance scale technique CKS/D82. This scale limited for nearby PN (D ≤ 3.5 kpc), so the surface fluxes less than other distance scales. With these criteria the results showed that the proposed distance scale is more accurate than other scales related to the observations for adopted sample of PN distances, also the limit of ionized radius (Rio) for all both optically thick and optically thin in
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More