Shear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity from petrophysical parameters and any pair of compressional wave velocity, porosity and density in carbonate rocks. The established method can estimate shear wave velocity in carbonate rocks with a correlation coefficient of close to unity.
This research will cover different aspects of estimating process of construction work in a desert area. The inherent difficulties which accompany the cost estimating of the construction works in desert environment in a developing country, will stem from the limited information available, resources scarcity, low level of skilled workers, the prevailing severe weather conditions and many others, which definitely don't provide a fair, reliable and accurate estimation. This study tries to present unit price to estimate the cost in preliminary phase of a project. Estimations are supported by developing mathematical equations based on the historical data of maintenance, new construction of managerial and school projects.
... Show MoreObjective: Comprehending microbial diversity and antibiotic resistance patterns is essential for efficient treatment protocols. This study sought to determine the incidence of bacterial and fungal pathogens responsible for burn and wound infections and their antibiotic susceptibility profiles. Methods: This cross-sectional study involved 140 patients with burn or wound infections. Sterile swabs and pus aspiration were employed to collect samples, which were subsequently processed using standard microbiological procedures. Antibiotic resistance was determined using the Kirby-Bauer disc diffusion method, following Clinical and Laboratory Standards Institute (CLSI) guidelines. Data was analysed using IBM SPSS version 25.0, and the Chi-
... Show MoreIsobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo
... Show MoreModified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreModified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreDespite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More