نتایج جستجو برای: wireline logs
تعداد نتایج: 10746 فیلتر نتایج به سال:
process mining includes the automated discovery of petri nets from event logs. these event logs are the starting point for various discovery and analysis techniques of the process. in this paper process model is developed using colored petri nets (cpns) and the supporting software package cpn tools. the restaurant process model is represented for the analysis using a combination of process min...
fractures are considered as one of the important structures in fractured reservoirs due to their effect on fluid currents and reservoirparameters such as porosity and permeability. fracture parameters can only be directly calculated with core and image logs. cores haveserious limitations, so image logs are the best method. the aim of this study is the systematic fractures analysis of the asmari...
Massive event logs are produced in information systems, which record executions of business processes in organizations. Various techniques are proposed to discover process models reflecting real-life behaviors from these logs. However, the discovered models are mostly in Petri nets rather than BPMN models, the current industrial process modeling standard. Conforti et al. and Weber et al. propos...
reservoir permeability is a critical parameter for characterization of the hydrocarbon reservoirs. in fact, determination of permeability is a crucial task in reserve estimation, production and development. traditional methods for permeability prediction are well log and core data analysis which are very expensive and time-consuming. well log data is an alternative approach for prediction of pe...
JDSF was recently contacted by the UC Forest Products Labor atory (FPL) with a request for madrone and tanoak logs for exper imental testing. The only requirement was that the logs be a minimum of 18 inches in diameter at the small end. Chief Sales Officer Hank Land and Heavy Forestry Equipment Operator Mike Williams were equal to the task. They felled, bucked and loaded the logs onto Univers...
Knowledge of internal defects within hardwood logs can be useful even prior to a log's entry into the sawmill. It is in the log yard where the first important decisions are made about processing. First, based upon perceived quality, logs may be sorted as veneer logs or as high-quality sawlogs and sold to domestic veneer mills or for export . Second, roundwood may be bucked into smaller logs to ...
On 08 April 2004, the Laboratory of Tree-Ring Science in the Department of Geography, University of Tennessee, received 14 logs from Larry R. Smart, Criminal Investigation Section, Office of the Sherriff, Collin County, Texas. Ten logs numbered 2600 to 2609 were retrieved from a crime scene. Four logs were retrieved from the scene of a gathering attended by the suspect. These logs are numbered ...
Generally, every Web search engine logs the user sessions. These records, called query logs, contain valuable information about the behaviour of Internet users and their language. There are only a few experiments on mining query logs, but they confirm that query logs are very useful for designing natural language applications in Web retrieval. This paper shows how lexical and semantic informati...
Web-based logs contain potentially useful data with which designers can assess the usability and effectiveness of their choices. Most guides to World Wide Web (Web) design derived from artistic or usability principles feature no empirical validation, while empirical studies of Web use typically rely on observer ratings. Several sources of unobtrusive usage data are available to Web designers, i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید