Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
RATE OF PENETRATION OPTIMIZATION FOR WELLBORES USING MACHINE LEARNING
Document Type and Number:
WIPO Patent Application WO/2019/036063
Kind Code:
A1
Abstract:
A system and method for controlling a drilling tool inside a wellbore makes use of projection of optimal rate of penetration (ROP) and optimal controllable parameters such as weight-on-bit (WOB), and rotations-per-minute (RPM) for drilling operations. Optimum controllable parameters for drilling optimization can be predicted using a data generation model to produced synthesized data based on model physics, an ROP model, and stochastic optimization. The synthetic data can be combined with real-time data to extrapolate the data across the WOB and RPM space. The values for WOB an RPM can be controlled to steer a drilling tool. Examples of models used include a non-linear model, a linear model, a recurrent generative adversarial network (RGAN) model, and a deep neural network model.

Inventors:
MADASU SRINATH (US)
RAIZADA NISHANT (US)
RANGARAJAN KESHAVA (US)
SAMUEL ROBELLO (US)
Application Number:
PCT/US2018/021703
Publication Date:
February 21, 2019
Filing Date:
March 09, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LANDMARK GRAPHICS CORP (US)
International Classes:
E21B44/00; E21B41/00
Domestic Patent References:
WO2016160005A12016-10-06
Foreign References:
US20160230530A12016-08-11
US20150227841A12015-08-13
US20150356450A12015-12-10
US20110220410A12011-09-15
Attorney, Agent or Firm:
PHILLIPS, Steven, B. et al. (US)
Download PDF:
Claims:
Claims

What is claimed is:

1 . A system comprising:

a drilling tool; and

a computing device in communication with the drilling tool, the computing device including a non-transitory memory device comprising instructions that include:

a data generation model that is executable by the computing device to generate synthetic data about rate of penetration, weight-on-bit, and rotations- per-minute using real-time data associated with the drilling tool, and to combine the synthetic data with the real-time data to form combined data; a rate of penetration model that is teachable using the combined data and that is executable by the computing device to use stochastic optimization to project a value for the rate of penetration per drilling sequence using range constraints and to project corresponding values for weight-on-bit and rotations-per-minute; and

a control module that is executable by the computing device to steer the drilling tool using corresponding values for at least one of the weight-on-bit or the rotations-per-minute.

2. The system of claim 1 wherein the synthetic data includes points outside a domain of the real-time data.

3. The system of claim 1 wherein at least one of the data generation model or the rate of penetration model comprises a linear model or a non-linear model.

4. The system of claim 1 wherein at least one of the data generation model or the rate of penetration model comprises a recurrent generative adversarial network (RGAN).

5. The system of claim 1 wherein at least one of the data generation model or the rate of penetration model comprises a deep neural network model including a plurality of hidden layers, each hidden layer comprising a plurality of nodes.

6. The system of claim 1 wherein the stochastic optimization comprises Bayesian optimization and wherein the drilling tool is steered by controlling the drilling tool to obtain the value of the rate of penetration by influencing the

corresponding values for weight-on-bit and rotations-per-minute.

7. A method of operating a drilling tool, the method comprising:

generating synthetic data about rate of penetration, weight-on-bit, and rotations-per-minute using real-time data associated with the drilling tool; combining the synthetic data with the real-time data to form combined data;

teaching a rate of penetration model using the combined data to produce a trained rate of penetration model;

projecting a value for the rate of penetration per drilling sequence using stochastic optimization of the trained rate of penetration model subject to range constraints;

projecting corresponding values for weight-on-bit and rotations-per- minute using the trained rate of penetration model; and

steering the drilling tool using the corresponding values for at least one of the weight-on-bit or the rotations-per-minute.

8. The method of claim 7 wherein the synthetic data includes points outside a domain of the real-time data.

9. The method of claim 7 wherein the trained rate of penetration model comprises a linear model or a non-linear model.

10. The method of claim 7 wherein the trained rate of penetration model comprises a recurrent generative adversarial network (RGAN).

1 1 . The method of claim 7 wherein the trained rate of penetration model comprises a deep neural network model including a plurality of hidden layers, each hidden layer comprising a plurality of nodes.

12. The method of claim 7 wherein the stochastic optimization comprises Bayesian optimization and wherein the drilling tool is steered by controlling the drilling tool to obtain the value of the rate of penetration by influencing the

corresponding values for weight-on-bit and rotations-per-minute.

13. The method of claim 7 further comprising repeating the teaching of the rate of penetration model, the projecting of the value for the rate of penetration per drilling sequence, and the projecting of corresponding values for weight-on-bit and rotations-per-minute for each of a plurality of measured depths.

14. A non-transitory computer-readable medium that includes instructions that are executable by a processing device for causing the processing device to perform operations comprising:

generating synthetic data about rate of penetration, weight-on-bit, and rotations-per-minute using real-time data associated with a drilling tool;

combining the synthetic data with the real-time data to form combined data;

teaching a rate of penetration model using the combined data to produce a trained rate of penetration model;

projecting a value for the rate of penetration per drilling sequence using stochastic optimization of the trained rate of penetration model subject to range constraints;

projecting corresponding values for weight-on-bit and rotations-per- minute using the trained rate of penetration model; and

outputting commands for steering the drilling tool using the corresponding values for at least one of the weight-on-bit or the rotations-per- minute.

15. The non-transitory computer-readable medium of claim 14 wherein the synthetic data includes points outside a domain of the real-time data.

16. The non-transitory computer-readable medium of claim 14 wherein the trained rate of penetration model comprises a linear model or a non-linear model.

17. The non-transitory computer-readable medium of claim 14 wherein the trained rate of penetration model comprises a recurrent generative adversarial network (RGAN).

18. The non-transitory computer-readable medium of claim 14 wherein the trained rate of penetration model comprises a deep neural network model including a plurality of hidden layers, each hidden layer comprising a plurality of nodes.

19. The non-transitory computer-readable medium of claim 14 wherein the stochastic optimization comprises Bayesian optimization and wherein the drilling tool is steered by controlling the drilling tool to obtain the value of the rate of penetration by influencing the corresponding values for weight-on-bit and rotations-per-minute.

20. The non-transitory computer-readable medium of claim 14 wherein the operations further comprise repeating the teaching of the rate of penetration model, the projecting of the value for the rate of penetration per drilling sequence, and the projecting of corresponding values for weight-on-bit and rotations-per-minute for each of a plurality of measured depths.

Description:
RATE OF PENETRATION OPTIMIZATION FOR WELLBORES USING

MACHINE LEARNING

Technical Field

[0001 ] The present disclosure relates generally to devices for use in well systems. More specifically, but not by way of limitation, this disclosure relates to real-time automated closed-loop control of a drilling tool during the drilling of a wellbore.

Background

[0002] A well (e.g., an oil or gas well) includes a wellbore drilled through a subterranean formation. The conditions inside the subterranean formation where the drill bit is passing when the wellbore is being drilled continuously change. For example, the formation through which a wellbore is drilled exerts a variable force on the drill bit. This variable force can be due to the rotary motion of the drill bit, the weight applied to the drill bit, and the friction characteristics of each strata of the formation. A drill bit may pass through many different materials (e.g., rock, sand, shale, clay, etc.) in the course of forming the wellbore and adjustments to various drilling parameters are sometimes made during the drilling process by a drill operator to account for observed changes.

Brief Description of the Drawings

[0003] FIG. 1 is a cross-sectional view of an example of a well system that includes a system for steering a drilling tool according to some aspects.

[0004] FIG. 2 is a schematic diagram of a system for steering a drilling tool according to some aspects.

[0005] FIG. 3 is a block diagram of a computing system for steering a drilling tool according to some aspects.

[0006] FIG. 4 is an example of a flowchart of a process for steering a drilling tool according to some aspects.

[0007] FIG. 5 is a graph comparing actual and projected values of rate of penetration using a non-linear rate of penetration model according to some aspects. [0008] FIG. 6 is a graph comparing actual and projected values of rate of penetration using a deep neural network rate of penetration model according to some aspects.

[0009] FIG. 7 is a table illustrating combined data including synthetic and realtime data according to some aspects.

Detailed Description

[0010] Certain aspects and features relate to a process that improves, and makes more efficient, the projection of optimal rate of penetration (ROP) and optimal controllable parameters, such as weight-on-bit (WOB) and rotations- per-minute (RPM), for drilling operations. The optimum controllable

parameters can be computed, and the parameters can be utilized for realtime, closed-loop control and automation of a drilling tool.

[001 1 ] Optimum controllable parameters for drilling optimization can be

predicted using a data generation model to produce synthesized data based on model physics, an ROP model, model training, and stochastic optimization. The synthetic data can be combined with real-time data to extrapolate the data across the WOB and RPM variable space. The data can be used for teaching a model. The trained model can be used in an optimizer to provide an optimized ROP. This information can be helpful in advising, in real time, the optimum controllable parameters for drilling.

[0012] A method of operating a drilling tool according to some aspects

includes generating synthetic data about rate of penetration (ROP), weight- on-bit (WOB), and rotations-per-minute (RPM) using real-time data associated with the drilling tool and combining the synthetic data with the real-time data to form combined data. The combined data is used to teach an ROP model and produce a trained ROP model. A value for ROP is projected using stochastic optimization of the trained ROP model. Corresponding values for WOB and RPM are also projected using the trained ROP model. The values for WOB and RPM are controlled to steer a drilling tool. Examples of an ROP model include a non-linear model, a linear model, a recurrent generative adversarial network (RGAN) model, and a deep neural network model. [0013] FIG. 1 is a cross-sectional side view of an example of a well system 100 according to some aspects. The well system 100 includes a wellbore 102 extending through a hydrocarbon bearing subterranean formation 104. In this example, the wellbore 102 is vertical, but in other examples the wellbore 102 can additionally or alternatively be horizontal or deviated.

[0014] In this example, the wellbore 102 includes a casing string 106 (e.g., a metal casing) extending from the well surface 108 into the subterranean formation 104. The casing string 106 can provide a conduit via which formation fluids, such as production fluids produced from the subterranean formation 104, can travel from the wellbore 102 to the well surface 108. In other examples, the wellbore 102 can lack the casing string 106.

[0015] The wellbore 102 can include a drilling tool 1 14 for extending the

wellbore 102. Additional tools can also be included, such as a safety tool, valve tool, packer tool, monitoring tool, formation testing tool, a logging-while- drilling tool, or any combination of these. In some examples, a tool is deployed in the wellbore 102 using a wireline 1 10, slickline, or coiled tube, which can be wrapped around a winch 1 18 or pulley at the well surface 108.

[0016] The well system 100 also includes a computing device 1 12. The

computing device 1 12 can be positioned at the well surface 108 or elsewhere (e.g., offsite). The computing device 1 12 may be in communication with the drilling tool 1 14, a sensor, or another electronic device. For example, the computing device 1 12 can have a communication interface for transmitting information to and receiving information from another communication interface 1 16 of the drilling tool 1 14.

[0017] In some examples, the computing device 1 12 can receive information from downhole (or elsewhere) in substantially real time, which can be referred to as real-time data. The real time data can include information related to the well system 100. For example, the drilling tool 1 14 can stream real-time data to the computing device 1 12, where the real-time data includes information about the orientation or location of the drilling tool 1 14 in the wellbore 102, or the ROP, WOB, or RPM for the drilling tool 1 14 through the wellbore 102. The computing device 1 12 can use the real-time data at least in part to teach an ROP model, which a well operator may use to determine one or more controllable parameters for performing an operation in the well system 100. For example, the computing device 1 12 can use the real-time data to teach a model that can be optimized to provide a predicted ROP for the drilling tool 1 14 through the subterranean formation 104 and predicted controllable parameters to be applied to drilling tool 1 14. A more specific example of the computing device 1 12 is described in greater detail below with respect to FIG. 3.

[0018] FIG. 2 is a schematic diagram of an example of a system 200 for

steering a drilling tool along projected path 202 of a wellbore being extended by the drilling tool. System 200 includes an optimizer 204 that can be executed by a processor to control the drilling tool connected by applying a stochastic optimization using real-time data received at each iteration, 206a, 206b, and 206c. Each iteration corresponds to a drilling sequence and drilling sequences occur at a plurality of measured depths. Optimizer 204 can be subject to range constraints dictated by engineering constraints. Range constraints can come, for example, from disruptive resonances in the drillstring at certain RPMs that need to be avoided. Also, the rate of penetration of the drilling tool may not exceed that which creates the maximum amount of debris that can be removed from the wellbore by fluid pumping in at a specified amount of time. Optimizer 204 produces values for controllable parameters that can be applied to the drilling tool by optimizing an ROP model 212. Optimizer 204 and ROP model 212 are, in this example, included in computing device 1 12 of FIG. 1 . Such controllable parameters include drill bit speed (here in units of RPM) 220 and WOB 222.

[0019] FIG. 3 depicts a block diagram of a computing device 1 12 according to one example. The computing device 1 12 includes a processing device 302, a bus 304, a communication interface 306, a non-transitory memory device 308, a user input device 324, and a display device 326. In some examples, some or all of the components shown in FIG. 3 can be integrated into a single structure, such as a single housing. In other examples, some or all of the components shown in FIG. 3 can be distributed (e.g., in separate housings) and in communication with each other. [0020] The processing device 302 can execute one or more operations for optimizing parameters for controlling a drilling tool. The processing device 302 can execute instructions stored in the memory device 308 to perform the operations. The processing device 302 can include one processing device or multiple processing devices. Non-limiting examples of the processing device 302 include a Field-Programmable Gate Array ("FPGA"), an application- specific integrated circuit ("ASIC"), a microprocessing device, etc.

[0021 ] The processing device 302 is communicatively coupled to the memory device 308 via the bus 304. The non-volatile memory device 308 may include any type of memory device that retains stored information when powered off. Non-limiting examples of the memory device 308 include electrically erasable and programmable read-only memory ("EEPROM"), flash memory, or any other type of non-volatile memory. In some examples, at least some of the memory device 308 can include a medium from which the processing device 302 can read instructions. A non-transitory computer-readable medium can include electronic, optical, magnetic, or other storage devices capable of providing the processing device 302 with computer-readable instructions or other program code. Non-limiting examples of a non-transitory computer- readable medium include (but are not limited to) magnetic disk(s), memory chip(s), read-only memory (ROM), random-access memory ("RAM"), an ASIC, a configured processing device, optical storage, or any other medium from which a computer processing device can read instructions. The instructions can include processing device-specific instructions generated by a compiler or an interpreter from code written in any suitable computer-programming language, including, for example, C, C++, C#, etc.

[0022] In the example of FIG. 3, the memory device 308 includes real-time data 310. The real-time data 310 can be communicated to the computing device 1 12 from one or more well tools or sensors positioned in one or more wellbores. The memory device 308 also includes a data-conditioning module 31 1 that can condition or filter the real-time data 310 prior to the real-time data 310 being further processed. The memory device 308 includes a data generation model 312. The data generation model 312 can be a software application for generating synthetic data for using in optimizing parameters for controlling a wellbore. The data created by the data generation model 312 can be stored as the synthetic data 314 in the memory device 308. The memory device 308 includes combined data 316, which can be a combination of the synthetic data 314 and the real-time data 310. An example of the combined data 316 is shown in chart form in FIG. 7, wherein "WOBRPM" is the product of WOB and RPM.

[0023] Continuing with FIG. 3, the memory device 308 includes the ROP

model 212, also shown in FIG. 2. The ROP model 212 can be a software application for optimizing a rate of penetration for a drilling operation. The generated data from the data generation model 312 can be used to teach the ROP model 212. In some examples, the data generation model 312 and the ROP model 212 are each a deep neural network model with three hidden layers and seventeen nodes in each of the chosen layers. The data

generation model and the ROP model can in other examples be linear, nonlinear, or an RGAN model. In one example, a non-linear model can be used for the example of data in FIG. 5. In another example, the deep neural network model can be used for the example of data in FIG. 6.

[0024] Additionally or alternatively, the memory device 308 includes the

optimizer 204, also shown in FIG. 2. The optimizer 204 can be a software application for performing stochastic Bayesian optimization of an ROP objective function built to obtain optimum values for controllable parameters such as WOB and RPM. Results from the optimizer can be stored as output values 322 in the memory device 308. The outputs can be applied to a drilling tool by control module 340, which is executable by the processing device to steer the drilling tool.

[0025] In some examples, the computing device 1 12 includes a

communication interface 306. The communication interface 306 can represent one or more components that facilitate a network connection or otherwise facilitate communication between electronic devices. Examples include, but are not limited to, wired interfaces such as Ethernet, USB, IEEE 1394, and/or wireless interfaces such as IEEE 802.1 1 , Bluetooth, near-field communication (NFC) interfaces, RFID interfaces, or radio interfaces for accessing cellular telephone networks (e.g. , transceiver/antenna for accessing a CDMA, GSM, UMTS, or other mobile communications network).

[0026] In some examples, the computing device 1 12 includes a user input device 324. The user input device 324 can represent one or more

components used to input data. Examples of the user input device 324 can include a keyboard, mouse, touchpad, button, or touch-screen display, etc.

[0027] In some examples, the computing device 1 12 includes a display device 326. The display device 326 can represent one or more components used to output data. Examples of the display device 326 can include a liquid-crystal display (LCD), a television, a computer monitor, a touch-screen display, etc. In some examples, the user input device 324 and the display device 326 can be a single device, such as a touch-screen display.

[0028] By using real-time field data to generate synthetic data and teach the ROP model, and optimizing predictions from the ROP model using range constraints, drilling control operations can be enhanced. FIG. 4 is an example of a flowchart of a process 400 for automated real-time steering of a drilling tool during formation or extension of a wellbore by optimizing predictions from the ROP model described in FIG. 2 and FIG. 3. At block 402 of process 400 processing device 302 generates synthetic data 314 regarding ROP, WOB, and RPM using non-linear, linear, RGAN, or deep neural network data generation model. The data generation model 312 has the ability to utilize real-time data as inputs and the model is ultimately taught (trained). An example of a deep neural network data generation model is a long short-term memory (LSTM) model. An example of a non-linear model is a model that takes the form:

ROP = K(WOB * RPM) a

where K is a constant.

[0029] At block 404 of process 400, the synthetic data 314 and real-time data 310 are combined by processing device 302 to form combined data 316 for ROP, WOB, and RPM. Combining the real-time and synthetic data allows training and optimization with data that is more extensive than might be possible if using real-time data alone, since it is not always possible to obtain real-time data across the variable domain in a reasonable amount of time. It is possible in some situations that optimal values do not occur within the domain of real-time data obtained. In such a case, optimal values can be found in the synthetic data since the synthetic data includes points

corresponding to variable values outside the domain of the real-time data. Combining real-time data with synthetic data ensures optimal values will be within the range of available data.

[0030] At block 406 of FIG. 4, the data generated in block 404 is used to teach the ROP model for an objective function needed for optimization. Processing device 302 teaches ROP model 212 using the combined data 316 for training. As in the case of the data generation model, the ROP model 212 can be nonlinear, linear, organized as an RGAN model, deep neural network model such as an LSTM model. In some examples, a deep neural network model includes multiple hidden layers and each hidden layer includes a plurality of nodes. In one example, a deep neural network model with 3 hidden layers with 17 nodes in each of the layers is used.

[0031 ] Still referring to FIG. 4, at block 408, processing device 302

stochastically optimizes the trained ROP model to project a value for ROP for a drilling sequence at depth. In one example, Bayesian optimization is used. An ROP objective function is built by processing device 302 is used at block 409 to produce optimum values for WOP and RPM corresponding to the projected ROP. At block 410, the drilling tool 1 14 is controlled by processing device 302 to obtain the projected value for ROP by influencing RPM and WOB. If the wellbore is still being formed at block 412 and another drilling sequence is needed for an additional depth, processing returns to block 402 and the process described above is repeated. Otherwise, the process 400 continues to further drilling, completion, or production operations at block 414.

[0032] FIG. 5 is an example graph 500 comparing actual and predicted values of rate of penetration using a non-linear ROP model according to some aspects. Actual values are indicated by line 502 and predicted values are indicated by line 504.

[0033] FIG. 6 is an example graph 600 comparing actual and predicted values of rate of penetration using a deep neural network model with three hidden layers and 17 nodes in each of the layer. In this example, a learning rate of 0.0002 and a momentum optimizer were chosen. The model predicted and actual values are shown below, but are almost indistinguishable except for the area between sequence 5000 and sequence 6000. In this area, the higher projected values are above the actual values by an amount 602.

[0034] FIG. 7 is a table 700 illustrating example combined data according to some aspects. The example synthetic data 702 and the example real-time data 704 are combined as described above for teaching the non-linear model discussed. WOBRPM is the product of WOB * RPM.

[0035] In some aspects, systems, devices, and methods for ROP optimization for controlling a drilling tool are provided according to one or more of the following examples. As used below, any reference to a series of examples is to be understood as a reference to each of those examples disjunctively (e.g., "Examples 1 -4" is to be understood as "Examples 1 , 2, 3, or 4").

[0036] Example #1 : A system includes a drilling tool, and a computing device in communication with the drilling tool. The computing device includes a non- transitory memory device comprising instructions that include a data generation model that is executable by the computing device to generate synthetic data about rate of penetration, weight-on-bit, and rotations-per- minute using real-time data associated with the drilling tool, and to combine the synthetic data with the real-time data to form combined data. The instructions also include a rate of penetration model that is teachable using the combined data and that is executable by the computing device to use stochastic optimization to project a value for the rate of penetration per drilling sequence using range constraints and to project corresponding values for weight-on-bit and rotations-per-minute. The instructions also include a control module that is executable by the computing device to steer the drilling tool using corresponding values for at least one of the weight-on-bit or the rotations-per-m inute.

[0037] Example #2: The system of example 1 wherein the synthetic data includes points outside a domain of the real-time data.

[0038] Example #3: The system of example(s) 1 or 2 wherein at least one of the data generation model or the rate of penetration model comprises a linear model or a non-linear model. [0039] Example #4: The system of example(s) 1 -3 wherein at least one of the data generation model or the rate of penetration model comprises a recurrent generative adversarial network (RGAN).

[0040] Example #5: The system of example(s) 1 -4 wherein at least one of the data generation model or the rate of penetration model comprises a deep neural network model including a plurality of hidden layers, each hidden layer comprising a plurality of nodes.

[0041 ] Example #6: The system of example(s) 1 -5 wherein the deep neural network model includes 17 hidden layers, each comprising 3 nodes.

[0042] Example #7: The system of example(s) 1 -6 wherein the stochastic optimization comprises Bayesian optimization and wherein the drilling tool is steered by controlling the drilling tool to obtain the value of the rate of penetration by influencing the corresponding values for weight-on-bit and rotations-per-m inute.

[0043] Example #8: A method of operating a drilling tool, the method

includes generating synthetic data about rate of penetration, weight-on-bit, and rotations-per-m inute using real-time data associated with the drilling tool and combining the synthetic data with the real-time data to form combined data. The method also includes teaching a rate of penetration model using the combined data to produce a trained rate of penetration model, projecting a value for the rate of penetration per drilling sequence using stochastic optimization of the trained rate of penetration model subject to range constraints, projecting corresponding values for weight-on-bit and rotations- per-m inute using the trained rate of penetration model, and steering the drilling tool using the corresponding values for at least one of the weight-on-bit or the rotations-per-m inute.

[0044] Example #9: The method of example 8 wherein the synthetic data includes points outside a domain of the real-time data.

[0045] Example #10: The method of example(s) 8 or 9 wherein the trained rate of penetration model comprises a linear model or a non-linear model.

[0046] Example #1 1 : The method of example(s) 8-10 wherein the trained rate of penetration model comprises a recurrent generative adversarial network (RGAN). [0047] Example #12: The method of example(s) 8-1 1 wherein the trained rate of penetration model comprises a deep neural network model including a plurality of hidden layers, each hidden layer comprising a plurality of nodes.

[0048] Example #13: The method of example(s) 8-12 wherein the deep

neural network model includes 17 hidden layers, each comprising 3 nodes.

[0049] Example #14: The method of example(s) 8-13 wherein the stochastic optimization comprises Bayesian optimization and wherein the drilling tool is steered by controlling the drilling tool to obtain the value of the rate of penetration by influencing the corresponding values for weight-on-bit and rotations-per-m inute.

[0050] Example #15: The method of example(s) 8-14 further comprising repeating the teaching of the rate of penetration model, the projecting of the value for the rate of penetration per drilling sequence, and the projecting of corresponding values for weight-on-bit and rotations-per-minute for each of a plurality of measured depths.

[0051 ] Example #16: A non-transitory computer-readable medium that

includes instructions that are executable by a processing device for causing the processing device to perform the method of example(s) 8-15.

[0052] The foregoing description of certain examples, including illustrated examples, has been presented only for the purpose of illustration and description and is not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Numerous modifications, adaptations, and uses thereof will be apparent to those skilled in the art without departing from the scope of the disclosure.