scholarly journals Geological data extraction from lidar 3-D photorealistic models: A case study in an organic-rich mudstone, Eagle Ford Formation, Texas

Geosphere ◽  
2014 ◽  
Vol 10 (3) ◽  
pp. 610-626 ◽  
Author(s):  
Daniel Minisini ◽  
Miao Wang ◽  
Steven C. Bergman ◽  
Carlos Aiken
2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2021 ◽  
Author(s):  
Justin Allison ◽  
Glyn Roberts ◽  
Brad Hicks Hicks ◽  
Todd Lilly

Abstract Fracture treatments and stage designs for new wells have evolved considerably over the past decade contributingto significant production growth. For example, in the acreage discussed hererecently used higher intensity fracturing methods provided an ~80% increase in recovery rates compared with legacy wells. Older wells completed originally with less efficient techniques can also benefit from these more up-to-date designs and treatments using re-fracturing methods. These offer the prospect of economically boosting production in appropriately selected wells. While adding in-fill wells has often been favored by Operators as a lowerrisk option the number of wells being re-fractured has grown every year for the last decade. In this case study two adjacent Eagle Ford wells, comprising a newly completed and a re-fractured well, allow both methods to be considered and compared. Completion design and fracture treatment effectiveness are evaluated using the uniformity of proppant distribution at cluster and stage level as the primary measure. Perforation erosion measurements from downhole video footage is used as the main diagnostic. Novel data acquisition methods combined with successful well preparation provided comprehensive and high-quality datasets. The subsequent proppant distribution analysis for the two wells provides the highest confidence results presented to date. Clear, repeatable trends in distribution are observed and these are compared across multiple stage designs for both the newly completed and re-fractured well. Variations in design parameters and how these effects distribution and ultimately recovery are discussed. These include changes to perforation count per cluster, cluster spacing, cluster count per stage, stage length, perforation charge size and treatment rates and volumes. As a final consideration production records for the evaluated wells are also discussed. Historical industry data shows that the number of wells being re-fractured increases relative to the number of newly drilled wells being completed during periods of low oil and gas prices. With the industry again facing harsh economic realities an increasing number of decisions will be made on whether new or refractured wells, or a combination of both, provide the best solution to replace otherwise inevitable production decline. This paper attempts to provide a detailed understanding of how proppant distribution, as a significant factor in production for hydraulically fractured wells, can be evaluated and considered in these decisions.


2021 ◽  
Author(s):  
Shintaro Kuroda ◽  
Shunichi Watanabe ◽  
Kenji Ueda
Keyword(s):  

The current digital era is full of digital devices and to ensure the safety of their data, users utilize the protective armor of passwords using the fingerprints lock, face lock, pin codes and password locks. The trial-and-error method possesses an infinite possibility of passwords in patterns/ pin locks for unlocking the devices. The levels of security ensure that only a limited number of trials are possible before any device blocks itself or makes unlocking harder. In these circumstances, especially when a victim is a deceased person (e. g. an abetment in suicide case), the password is practically impossible to attain through the authorities. However, the data can be retrieved with the unique and distinctive method of Chip-off analysis. In this study, a password protected mobile phone was retrieved from a deceased individual and only the analysis of his/her mobile could lead to investigative insights for catching the perpetrator. The Chip-off method has several difficulties and a password/ pin protected device increases the difficulties for analysis several folds. This study highlights the significance of chip-off analysis in achieving accurate importing and extraction of maximum data along with the use of the hardware/software, MSAB, XRY and other software.


2015 ◽  
pp. 1539-1556
Author(s):  
Dhiraj Murthy ◽  
Alexander Gross ◽  
Alex Takata

This chapter identifies a number of the most common data mining toolkits and evaluates their utility in the extraction of data from heterogeneous online social networks. It introduces not only the complexities of scraping data from the diverse forms of data manifested in these sources, but also critically evaluates currently available tools. This analysis is followed by a presentation and discussion on the development of a hybrid system, which builds upon the work of the open-source Web-Harvest framework, for the collection of information from online social networks. This tool, VoyeurServer, attempts to address the weaknesses of tools identified in earlier sections, as well as prototype the implementation of key functionalities thought to be missing from commonly available data extraction toolkits. The authors conclude the chapter with a case study and subsequent evaluation of the VoyeurServer system itself. This evaluation presents future directions, remaining challenges, and additional extensions thought to be important to the effective development of data mining tools for the study of online social networks.


2019 ◽  
Author(s):  
Mary Garza ◽  
Joshua Baumbach ◽  
James Prosser ◽  
Spencer Pettigrew ◽  
Kirsten Elvig
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document