Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and anomalous rock faces. Furthermore, the paper explores the adoption of advanced methods, including hydraulic flow units (HFU), providing a fine-grained understanding of reservoir heterogeneity and contributing to the prediction of flow dynamics. The final section includes structural geological models, petrophysical data collected, rock type classification, and spatial data to better represent the reservoir bottom structure. It provides a valuable resource for researchers, geologists, and engineers seeking to characterize reservoirs and make optimal decisions on hydrocarbon exploration and production. It is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreEconazole nitrate (EN) is considered as the most effective agent for the treatment of all forms of
dermatomycosis caused by dermatophytes. This study was carried out to formulate a stable
Econazole nitrate solution for a topical use through preparation of different formulas and selected
the most suitable one. The results indicated that the use of propylene glycol and ethanol as a vehicle
for EN which is very slightly soluble in water gave amore stable formula as EN topical solution,
with a shelf life of about 3.15 years .The data also indicated that the light accelerated the
degradation of EN, while the type of container (glass or plastic) had no effect on the rate of drug.
The overall results of this study suggest t
An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored.A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure.Pharmacological s
... Show MoreThe samples were collected monthly crustaceans Mjmafah foot of two stations in tributary Zab down and two others in the Tigris River for one year with effect from November 2001 until October 2002 recorded during the study period the current 41 units taxonomic and were higher density of Mjmafah foot Guy Tigris River before the mouth of the tributary
In this study multi objective optimization is utilized to optimize a turning operation to reveal the appropriate level of process features. The goal of this work is to evaluate the optimal combination of cutting parameters like feed, spindle speed, inclination angle and workpiece material to have a best surface quality Taguchi technique L9 mixed orthogonal array, has been adopted to optimize the roughness of surface. Three rods of length around (200 mm) for the three metals are used for this work. Each rod is divided into three parts with 50 mm length. For brass the optimum parametric mix for minimum Ra is A1, B1 and C3, i.e., at tool inclination angle (5), feedrate of 0.01, spindle speed of 120
... Show MoreThe novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta
... Show MoreThe present study cognitive aims to investigate the negation phenomenon in American political discourse under Critical Discourse Analysis (CDA) principles. The research sample includes two speeches given by Clinton and Trump in their election campaigns in 2016. Since the nature of the study follows the social-cognitive approach, the researcher adopted two models of analysis to achieve the study’s objectives: First, the theoretical framework of MST (developed by Fauconnier (1994), Fauconnier and Sweetser (1996) to examine meaning construction resulting from building different levels of negative mental spaces by two different genders the selected speeches. Second, pragmatic model to examine the role of gender from the functional per
... Show MoreSystole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.