V. K. Bust, A. Majid, Joshua Uzezi Oletu, P. Worthington
The host rocks of shale gas accumulations act as source, seal and reservoir. They are characterized by complex pore systems with ultra-low to low interparticle permeability and low to moderate porosity. The word ‘shale’ is used in the sense of a geological formation rather than a lithology, so shale gas reservoirs can show marked variations in rock type from claystones, marlstones and mudstones to sandstone and carbonate lithological ‘sweet spots’. The pore space includes both intergranular and intrakerogen porosity. The density of natural fractures varies markedly, and pore throat connectivity is relatively ineffective. Moreover, in-situ gas pore volume has to take account of both free and adsorbed gas, an evaluation exercise that is complicated by pronounced variations in water salinity. All these characteristics present major challenges to the process of petrophysical evaluation. The petrophysical responses to these issues are severalfold. First, a broader calibrating database of core measurements is required at key wells, especially as regards mineralogy, porosity and permeability data, shale/mudstone sample analyses, total organic carbon, gas desorption isotherms, and the analysis of extracted formation waters. Second, at least in the key wells, an extended suite of logs should include an elemental analysis log, magnetic resonance imager, electrical micro-imager, and a dipole sonic log. These databases lead to a rock-typing scheme that takes better account of dynamic properties and fracturability. They also allow reservoir partitioning based on exclusivity of empirical interpretative algorithms, e.g. quartz content vs. producibility. These responses comprise key elements of a functional petrophysical system that encompasses fit-for-purpose interpretation methods, such as a pseudo-Archie approach, i.e. the application of the Archie equations with non-intrinsic exponents. This system is presented as a workflow for application in shale gas reservoirs, for which bulk density retains a major influence on computed gas in place. The benefits of this approach are especially strong in reserves reporting of these unconventional gas reservoirs.
{"title":"The petrophysics of shale gas reservoirs: Technical challenges and pragmatic solutions","authors":"V. K. Bust, A. Majid, Joshua Uzezi Oletu, P. Worthington","doi":"10.1144/petgeo2012-031","DOIUrl":"https://doi.org/10.1144/petgeo2012-031","url":null,"abstract":"The host rocks of shale gas accumulations act as source, seal and reservoir. They are characterized by complex pore systems with ultra-low to low interparticle permeability and low to moderate porosity. The word ‘shale’ is used in the sense of a geological formation rather than a lithology, so shale gas reservoirs can show marked variations in rock type from claystones, marlstones and mudstones to sandstone and carbonate lithological ‘sweet spots’. The pore space includes both intergranular and intrakerogen porosity. The density of natural fractures varies markedly, and pore throat connectivity is relatively ineffective. Moreover, in-situ gas pore volume has to take account of both free and adsorbed gas, an evaluation exercise that is complicated by pronounced variations in water salinity. All these characteristics present major challenges to the process of petrophysical evaluation. The petrophysical responses to these issues are severalfold. First, a broader calibrating database of core measurements is required at key wells, especially as regards mineralogy, porosity and permeability data, shale/mudstone sample analyses, total organic carbon, gas desorption isotherms, and the analysis of extracted formation waters. Second, at least in the key wells, an extended suite of logs should include an elemental analysis log, magnetic resonance imager, electrical micro-imager, and a dipole sonic log. These databases lead to a rock-typing scheme that takes better account of dynamic properties and fracturability. They also allow reservoir partitioning based on exclusivity of empirical interpretative algorithms, e.g. quartz content vs. producibility. These responses comprise key elements of a functional petrophysical system that encompasses fit-for-purpose interpretation methods, such as a pseudo-Archie approach, i.e. the application of the Archie equations with non-intrinsic exponents. This system is presented as a workflow for application in shale gas reservoirs, for which bulk density retains a major influence on computed gas in place. The benefits of this approach are especially strong in reserves reporting of these unconventional gas reservoirs.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In optimization of design of heterogeneous distributed system, the search space is large, and the applicable area is narrow. In this paper, we develop a new Particle Swarm Optimization (PSO) called DSPSO to solve these problems. When used on distributed system, DSPSO has high possibility to discover the applicable solution, and can get better optimal applicable solution and better average result. At the same time, this algorithm does not need any transformation of the problem, and does not rely on human-machine interaction. The tests show that this algorithm is easy to implement, easy to use and effective. It is highly valuable in similar optimization of design.
{"title":"Improved Particle Swarm Optimization in Design of Heterogeneous Distributed System","authors":"Jin-Guo Zhao, Qing-Yun Luo","doi":"10.1109/IPTC.2010.67","DOIUrl":"https://doi.org/10.1109/IPTC.2010.67","url":null,"abstract":"In optimization of design of heterogeneous distributed system, the search space is large, and the applicable area is narrow. In this paper, we develop a new Particle Swarm Optimization (PSO) called DSPSO to solve these problems. When used on distributed system, DSPSO has high possibility to discover the applicable solution, and can get better optimal applicable solution and better average result. At the same time, this algorithm does not need any transformation of the problem, and does not rely on human-machine interaction. The tests show that this algorithm is easy to implement, easy to use and effective. It is highly valuable in similar optimization of design.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"12 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131941917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This network security information in the confrontation as the research object, starting from the information model of confrontation to study the current dynamics of the network defense technology and defense systems. From the dynamic security deployment, attack the information decision-making, the three aspects of public knowledge acquisition to build a dynamic defense system model, through the confrontation of the model simulation results to validate the safety of defense capability.
{"title":"Research on Inform Rivalry Model and Dynamic Defense System under Network Environment","authors":"Wei-men Gao, Gui-xiang Li","doi":"10.1109/IPTC.2010.66","DOIUrl":"https://doi.org/10.1109/IPTC.2010.66","url":null,"abstract":"This network security information in the confrontation as the research object, starting from the information model of confrontation to study the current dynamics of the network defense technology and defense systems. From the dynamic security deployment, attack the information decision-making, the three aspects of public knowledge acquisition to build a dynamic defense system model, through the confrontation of the model simulation results to validate the safety of defense capability.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The genetic algorithm is the intelligence computational method widely used in solving the optimization problems, however many current genetic algorithms has premature convergence and stagnation behavior while solving complex question. This may because the algorithm had lost the ability of discovering that new or potential genetic material before convergence limited its search to solution space with wide range. Enlightened by hierarchical fair competition widely existed in nature, this paper has studied a model based on Pyramid model of hierarchical fair competition which uses pipeline structure divided sub-population rank according to fitness gradient, guarantee the recent discovery potential genetic material to obtain full development by maintaining a certain global selection pressure under reducing the local selection pressure of sub-population. Unlike traditional genetic algorithm's strategy which attempts to jumps out local optima region from high evolutional population included a high similarity "building block", the Pyramid model continuously maintain the sub-population with the medium fitness value to ensure keeping the multiplicity of the population by the strategy which the new local optima is bottom-up bred and processed unceasingly. Finally, this paper confirms the validity of the algorithm and the multiplicity of the population by HIFF128/256 problems based on binary encoding, and compared the improved algorithm from the solution quality and standard deviation of the population with traditional genetic algorithm, proves this improved algorithm can effectively alleviate premature convergence problem of the traditional genetic algorithm.
{"title":"Research on Genetic Algorithm Based on Pyramid Model","authors":"Yong Peng, C. Dong, Huijun Zheng","doi":"10.1109/IPTC.2011.28","DOIUrl":"https://doi.org/10.1109/IPTC.2011.28","url":null,"abstract":"The genetic algorithm is the intelligence computational method widely used in solving the optimization problems, however many current genetic algorithms has premature convergence and stagnation behavior while solving complex question. This may because the algorithm had lost the ability of discovering that new or potential genetic material before convergence limited its search to solution space with wide range. Enlightened by hierarchical fair competition widely existed in nature, this paper has studied a model based on Pyramid model of hierarchical fair competition which uses pipeline structure divided sub-population rank according to fitness gradient, guarantee the recent discovery potential genetic material to obtain full development by maintaining a certain global selection pressure under reducing the local selection pressure of sub-population. Unlike traditional genetic algorithm's strategy which attempts to jumps out local optima region from high evolutional population included a high similarity \"building block\", the Pyramid model continuously maintain the sub-population with the medium fitness value to ensure keeping the multiplicity of the population by the strategy which the new local optima is bottom-up bred and processed unceasingly. Finally, this paper confirms the validity of the algorithm and the multiplicity of the population by HIFF128/256 problems based on binary encoding, and compared the improved algorithm from the solution quality and standard deviation of the population with traditional genetic algorithm, proves this improved algorithm can effectively alleviate premature convergence problem of the traditional genetic algorithm.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117050966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an ASP flood in a High-Temperature, High-Salinity, Low-Permeability Carbonate","authors":"D. Levitt, S. Dufour, G. Pope, D. Morel, P. Gauer","doi":"10.2523/IPTC-14915-MS","DOIUrl":"https://doi.org/10.2523/IPTC-14915-MS","url":null,"abstract":"","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article focuses on the comparison between China and U.S in middle school mathematics teaching choreography, we want to find the different in the attention to the application problem and treatment. And we also focus on the application of U.S. high school mathematics textbooks scheduling problems, choosing a representative sample mathematical textbooks course1-3 published by PRENTICE HALL for research. And we use examples to show that the materials have the three levels of colorful mathematical application problem. Then we can know the rich life reality and knowledge background in American middle school students’ mathematics study and experience the real challenges of U.S. high school students faced in math test. Expect to bring readers a wealth of educational resources. Keywords— U.S. mathematics textbooks, Application problems, Example, Exploration.
{"title":"Exploration and Example for Mathematical Application Issues in U.S. Mathematics Textbooks","authors":"Gui-ming Shao, C. Xiong","doi":"10.1109/IPTC.2011.63","DOIUrl":"https://doi.org/10.1109/IPTC.2011.63","url":null,"abstract":"This article focuses on the comparison between China and U.S in middle school mathematics teaching choreography, we want to find the different in the attention to the application problem and treatment. And we also focus on the application of U.S. high school mathematics textbooks scheduling problems, choosing a representative sample mathematical textbooks course1-3 published by PRENTICE HALL for research. And we use examples to show that the materials have the three levels of colorful mathematical application problem. Then we can know the rich life reality and knowledge background in American middle school students’ mathematics study and experience the real challenges of U.S. high school students faced in math test. Expect to bring readers a wealth of educational resources. Keywords— U.S. mathematics textbooks, Application problems, Example, Exploration.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the wide application of E-mail, unsolicited bulk email has become a major problem for E-mail users. In order to reduce the influence of spam false negative result, an improvement solution based on the traditional Bayesian algorithm is proposed, in which the loss factor is introduced to evaluate the risk of spam false negative rate. At last, the experimental result indicates that the improved Bayesian algorithm can reduce the false negative error rate when filtering spam E-mail, and get more desirable recall ratios and precision ratios.
{"title":"An Improved Bayesian Algorithm for Filtering Spam E-Mail","authors":"Yin Hu, Chaoyang Zhang","doi":"10.1109/IPTC.2011.29","DOIUrl":"https://doi.org/10.1109/IPTC.2011.29","url":null,"abstract":"With the wide application of E-mail, unsolicited bulk email has become a major problem for E-mail users. In order to reduce the influence of spam false negative result, an improvement solution based on the traditional Bayesian algorithm is proposed, in which the loss factor is introduced to evaluate the risk of spam false negative rate. At last, the experimental result indicates that the improved Bayesian algorithm can reduce the false negative error rate when filtering spam E-mail, and get more desirable recall ratios and precision ratios.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125945044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nam Con Son Basin Analysis: The Old and New","authors":"K. Meyer","doi":"10.2523/IPTC-14470-MS","DOIUrl":"https://doi.org/10.2523/IPTC-14470-MS","url":null,"abstract":"","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133482894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haitang Zhang, Jinqing Jiang, Ziliang Wang, Jinshan Chen, Yanhong Cui
To meet the employment situation in modern society, and expand career opportunity, college students should have solid theoretical foundation and excellent practical skills, and can solve the practical problems in society or related profession. In the process of cultivating high-quality talents in veterinary medicine, the following improvements should be considered: fast the practical teaching reform, establish the rules of practical teaching, strengthen the teachers' practical skills, increase the amounts of practical base in or off-school, refresh the practical teaching curriculum, stress on training of applied talents, and pay great attention to the needs of social development.
{"title":"Study on Approach to Improve the Quality of Veterinary Medicine Graduates by Strengthen Practical Skills","authors":"Haitang Zhang, Jinqing Jiang, Ziliang Wang, Jinshan Chen, Yanhong Cui","doi":"10.1109/IPTC.2011.39","DOIUrl":"https://doi.org/10.1109/IPTC.2011.39","url":null,"abstract":"To meet the employment situation in modern society, and expand career opportunity, college students should have solid theoretical foundation and excellent practical skills, and can solve the practical problems in society or related profession. In the process of cultivating high-quality talents in veterinary medicine, the following improvements should be considered: fast the practical teaching reform, establish the rules of practical teaching, strengthen the teachers' practical skills, increase the amounts of practical base in or off-school, refresh the practical teaching curriculum, stress on training of applied talents, and pay great attention to the needs of social development.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130299279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.2523/IPTC-15335-ABSTRACT
M. F. Rahim, M. Meju, A. Bujang, M. I. A. Fuad, H. A. Majid
{"title":"Detecting Hydrocarbon Reservoir through Inversion of Broadband Multicomponent CSEM Data and Joint Interpretation with Seismic Constraints","authors":"M. F. Rahim, M. Meju, A. Bujang, M. I. A. Fuad, H. A. Majid","doi":"10.2523/IPTC-15335-ABSTRACT","DOIUrl":"https://doi.org/10.2523/IPTC-15335-ABSTRACT","url":null,"abstract":"","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133026190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}