The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated with the pore and fluid distribution. Throughout recent years, several studies have been conducted on rock properties, such as porosity, permeability, capillary pressure, hydrocarbon saturation, fluid properties, electrical resistivity, self-or natural-potential, and radioactivity of different types of rocks. These properties and their relationships are used to evaluate the presence or absence of commercial quantities of hydrocarbons in formations penetrated by, or lying near, the wellbore. A principal purpose of this paper is to review the history of development the most common techniques used to calculate petrophysics properties in the laboratory and field based primarily on the researchers and scientists own experience in this field.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThin films of iridium doped indium oxide (In2O3:Eu)with different doping ratio(0,3,5,7,and 9%) are prepared on glass and single crystal silicon wafer substrates using spray pyrolysis method. The goal of this research is to investigate the effect of doping ratio on of the structural, optical and sensing properties . The structure of the prepared thin films was characterized at room temperature using X-ray diffraction. The results showed that all the undoped and doped (In2O3:Eu)samples are polycrystalline in structure and nearly stoichiometric. UV-visible spectrophotometer in the wavelength range (200-1100nm)was used to determine the optical energy gap and optical constants. The optical transmittance of 83% and the optical band gap of 5.2eV
... Show MoreIn this study, SnS thin films were deposited onto glass substrate by thermal evaporation technique at 300K temperature. The SnS films have been prepared with different thicknesses (100,200 &300) nm. The crystallographic analysis, film thickness, electrical conductivity, carrier concentration, and carrier mobility were characterized. Measurements showed that depending on film thickness. The D.C. conductivity increased with increase in film thickness from 3.720x10-5 (Ω.cm)-1 for 100 nm thickness to 9.442x10-4 (Ω.cm)-1 for 300 nm thicknesses, and the behavior of activation energies, hall mobility, and carrier concentration were also studied.
The primary purpose of this paper is to introduce the, 2- coprobabilistic normed space, coprobabilistic dual space of 2- coprobabilistic normed space and give some facts that are related of them