The instant global trend towards developing tight reservoir is great; however, development can be very challenging due to stress and geomechanical properties effect in horizontal well placement and hydraulic fracturing design. Many parameters are known to be important to determine the suitable layer for locating horizontal well such as petrophysical and geomechanical properties. In the present study, permeability sensitivity to stress is also considered in the best layer selection for well placement. The permeability sensitivity to the stress of the layers was investigated using measurements of 27 core sample at different confining stress values. 1-D mechanical earth model (MEM) was built and converted to a 3-D full-field geomechanical model to reach perfect layer choice. The analysis of results has diagnosed the maximum horizontal stress direction of NE-SW as determined using both Fullbore Formation Micro Imager FMI and sonic scanner anisotropy analysis. The effect of porosity and permeability compaction as a result of stress changes while reservoir depletion is including on the reservoir simulation model. The choice of best layer and optimum design criteria for hydraulic fracturing is done in the current study using a compaction simulation model with the results of available measurements of geomechanical properties. The results of the simulation model show that the formation sensitivity to stress is an important factor for detecting a suitable layer for horizontal wells placement. The results of MEM indicate that horizontal stress difference (Δσ) and unconfined compressive strength (UCS) are the most important factors among geomechanical parameters affected the layer selection. From simulation results, it was found that 225 to 275 m fracture half-length gives a higher increment in oil production. The optimum number of fracture stages is noticed to be 8 to 10 stages after which the increment in production will reduce.
Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreProgression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreDiscrete Krawtchouk polynomials are widely utilized in different fields for their remarkable characteristics, specifically, the localization property. Discrete orthogonal moments are utilized as a feature descriptor for images and video frames in computer vision applications. In this paper, we present a new method for computing discrete Krawtchouk polynomial coefficients swiftly and efficiently. The presented method proposes a new initial value that does not tend to be zero as the polynomial size increases. In addition, a combination of the existing recurrence relations is presented which are in the n- and x-directions. The utilized recurrence relations are developed to reduce the computational cost. The proposed method computes app
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables