Efficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pressure drilling (MPD), rotary steerable system (RSS), and expandable liner hanger (ELH), are investigated and evaluated through case study analyses, comparing their performance to that of conventional drilling techniques. The findings indicate that vertical drilling with mud motor exhibits superior drilling performance and wellbore verticality compared to conventional rotary drilling bottom hole assemblies (BHA) for drilling the 17 ½" hole section. MPD systems employed in the 12 ¼" hole section demonstrate safe drilling operations and higher rates of penetration (ROP) than conventional drilling methods. Rotary steerable systems exhibit reduced tortuosity and achieve higher ROP when compared to mud motor usage in the 8.5" and 6" hole sections. Lastly, investigations of expandable liner hanger cases reveal subpar cement quality in the first case and liner remedial work in the second case, highlighting the successful implementation of ELH techniques in the offset field. Overall, this paper highlights the advantages of utilizing advanced drilling techniques in Buzurgan Oil Field, showcasing their ability to mitigate drilling risks and enhance drilling operations when compared to conventional drilling approaches.
In this paper, estimation of system reliability of the multi-components in stress-strength model R(s,k) is considered, when the stress and strength are independent random variables and follows the Exponentiated Weibull Distribution (EWD) with known first shape parameter θ and, the second shape parameter α is unknown using different estimation methods. Comparisons among the proposed estimators through Monte Carlo simulation technique were made depend on mean squared error (MSE) criteria
In this paper, one of the Machine Scheduling Problems is studied, which is the problem of scheduling a number of products (n-jobs) on one (single) machine with the multi-criteria objective function. These functions are (completion time, the tardiness, the earliness, and the late work) which formulated as . The branch and bound (BAB) method are used as the main method for solving the problem, where four upper bounds and one lower bound are proposed and a number of dominance rules are considered to reduce the number of branches in the search tree. The genetic algorithm (GA) and the particle swarm optimization (PSO) are used to obtain two of the upper bounds. The computational results are calculated by coding (progr
... Show MoreArtificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the
domain of optimization and operation research. Several research papers dealt with methods of solving this
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested
employing the improved algorithm to confirm its effectiveness and evaluate its ex
In this paper, the oscillatory properties and asymptotic behaviour of a third-order three-dimensional neutral system are discussed. Some sufficient conditions are obtained to ensure that all bounded positive solutions of the system are oscillatory or non-oscillatory. On the other hand, the non-oscillatory solutions either converge or diverge when goes to infinity. A special technique is adopted to include all possible cases. The obtained results include illustrative examples.
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce
... Show MoreThe dynamical behavior of an ecological system of two predators-one prey updated with incorporating prey refuge and Beddington –De Angelis functional response had been studied in this work, The essential mathematical features of the present model have been studied thoroughly. The system has local and global stability when certain conditions are met. had been proved respectively. Further, the system has no saddle node bifurcation but transcritical bifurcation and Pitchfork bifurcation are satisfied while the Hopf bifurcation does not occur. Numerical illustrations are performed to validate the model's applicability under consideration. Finally, the results are included in the form of points in agreement with the obt
... Show MoreIn this paper, a discrete- time ratio-dependent prey- predator model is proposed and analyzed. All possible fixed points have been obtained. The local stability conditions for these fixed points have been established. The global stability of the proposed system is investigated numerically. Bifurcation diagrams as a function of growth rate of the prey species are drawn. It is observed that the proposed system has rich dynamics including chaos.
The production and analysis of an optimal interference pattern for the optical fiber interferometer of a 193.1THz continuous laser source was simulated by comparing the spectral spectroscopy of the two arms of interferometer to be used as a heterodyne detection in sensing the body range, speed, and direction of movement by delaying the time between the arms.
The study showed that the fringe pattern can be sensed a range by the free spectral range FSR and the velocity by the fringe separation FS and the direction by the fringe spatial frequency FSF.