The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated with the pore and fluid distribution. Throughout recent years, several studies have been conducted on rock properties, such as porosity, permeability, capillary pressure, hydrocarbon saturation, fluid properties, electrical resistivity, self-or natural-potential, and radioactivity of different types of rocks. These properties and their relationships are used to evaluate the presence or absence of commercial quantities of hydrocarbons in formations penetrated by, or lying near, the wellbore. A principal purpose of this paper is to review the history of development the most common techniques used to calculate petrophysics properties in the laboratory and field based primarily on the researchers and scientists own experience in this field.
Introduction: Elite football performance hinges on rapid tactical decision-making under physical and cognitive strain. While peripheral fatigue’s effects on motor output are well documented, the neurophysiological markers of mental fatigue and their impact on in-game decision making remain underexplored. Objective: To determine how EEG-derived central fatigue indices—frontal theta power and the theta/alpha ratio—relate to tactical decision accuracy and speed in elite football players. Methodology: Twenty male national-level footballers (age 22.4 ± 2.1 years; ≥ 5 years’ experience) completed the Yo-Yo Intermittent Recovery Test Level 1 while wearing an 8-channel dry-electrode frontal EEG headset. Frontal theta
... Show MoreGround state energies and other properties of 2S shell for some atoms as Be(Z=4), B(Z=5), C(Z=6) and N(Z=7) were calculated by using Hartree-Fock wave function. We found the values of potential energies in hartree unit (3.8369, 6.78565, 10.18852 and 14.41089) respectively and the other proprieties like expectation values of the position < r1m > were in agreement with the published results. All the studied atomic properties were normalized.
The aim of this study is to identify the effect of particle size and to increase the concentration of Iraqi bentonite on rheological properties in order to evaluate its performance and to know if it can be used as drilling fluid without additives or not. In this study, Iraqi bentonite was carried out by mineral composition (XRD), chemical composition (XRF) and Particle size distribution (PSD), and its rheological properties were measured at different particle size and concentration. The results showed that when the particle size of Iraqi bentonite decreased, and the rheological properties were increased with increased concentration of Iraqi bentonite. Also, Iraqi bentonite was unable to use as drilling fluid without certain additives.
... Show MorePurpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.