Increasing hydrocarbon recovery from tight reservoirs is an essential goal of oil industry in the recent years. Building real dynamic simulation models and selecting and designing suitable development strategies for such reservoirs need basically to construct accurate structural static model construction. The uncertainties in building 3-D reservoir models are a real challenge for such micro to nano pore scale structure. Based on data from 24 wells distributed throughout the Sadi tight formation. An application of building a 3-D static model for a tight limestone oil reservoir in Iraq is presented in this study. The most common uncertainties confronted while building the model were illustrated. Such as accurate estimations of cut-off permeability and porosity values. These values directly affect the calculation of net pay thickness for each layer in the reservoir and consequently affect the target of estimating reservoir initial oil in place (IOIP). Also, the main challenge to the static modeling of such reservoirs is dealing with tight reservoir characteristics which cause major reservoir heterogeneity and complexities that are problematic to the process of modeling reservoir simulation. Twenty seven porosity and permeability measurements from Sadi/Tanuma reservoir were used to validate log interpretation data for model construction. The results of the history matching process of the constructed dynamic model is also presented in this paper, including data related to oil production, reservoir pressure, and well flowing pressure due to available production.
The aims of research is to identify the role of strategic human resource management Practices in organizational performance improvement in the Baghdad soft drinks company, as well as the implications of the results for both managers and practitioners.
In order to achieve the objectives of the research, the researcher designed questionnaire included (40) items to collect the initial data from the research sample consisting of (53) Single. In light of that has been collecting and analyzing data and test hypotheses using the statistical package for Social Sciences (SPSS21), and use a number of statistical methods to achieve the goal of the research, including the means, standard deviations and simple correla
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
A new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
Multi-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the chara
... Show MoreDiscriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.
In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.
This research which is entitled (Devine Beauty), aims at studying the philosophical and literary extensive visions of Andalusian poets in search of pleasure in the beauty of divine self and its impact on the formation of a philosophical frame of mind. It also attempts to investigate the aesthetic aspects that highlight the prestige and greatness and majesty of that absolute beauty.
The most important conclusion of the reach is the Bany Ahmar poets use the beauty of women and the pleasure of wine as cods to reach divine beauty and get the happiness desired with the reflection of absolute beauty in a clear philosophy and thinking of the kingdom of God Almighty.
In recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to
A 20 year-old male was admitted with a history of recurrent palpitations from 5 years. Baseline ECG revealed premature ventricular contractions (PVCs) with delta waves. Stress ECG showed short non-sustained Ventricular tachycardia (VT). Echocardiography showed moderate dilation of the left ventricle with mild reduced systolic function and Ejection fraction was estimated to be 42%. Right ventricle was mildly dilated and hypokinetic. Both atria were mildly dilated. The patient referred to CVC for EP study with possible ablation. The ablation of the focus led to complete suppression of the ectopy. Post-procedure ECG and echocardiography showed normalized rhythm and systolic function.