ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with the well. Many bases on which well probes are depend on obtaining information, and preventing the rocks from responding to stimuli sent by special devices, whether those stimuli are electrical, radioactive, or acoustic. In addition, there are electrically controlled mechanical bases used to measure the diameter of the well, its flow, pressure, perforation, and taking samples. Wireline refers to the technique of using the cable to deliver special equipment to the bottom of the well to repair, evaluation, or equipment recovery. A simple wireline consists of a shiny metal wire (called a slickline) that is very durable for tensile and wear operations. It is of (0.108" or 0.125") diameter. The equipment is installed at the end of the wire. Still, sometimes a braided cable is used from many small steel wires (Braided line), which makes it stronger and heavier than the first type. The information obtained from the logs is considered to assess geological areas based on porosity, permeability, hydrocarbon fluids, and shale ratio. Well logging uses logs that are much cheaper than core operations and also cheaper than the information obtained from drilling mud. This review aims to pinpoint on the most important logging processes used in oil wells, as well logs have an effective role in all stages of the oil industry.
In this study, silver-tungsten oxide core–shell nanoparticles (Ag–WO3 NPs) were synthesized by pulsed laser ablation in liquid employing a (1.06 µm) Q-switched Nd:YAG laser, at different Ag colloidal concentration environment (different core concentration). The produced Ag–WO3 core–shell NPs were subjected to characterization using UV–visible spectrophotometry, X-ray diffraction (XRD), transmission electron microscopy (TEM), energy-dispersive spectroscopy, electrical analysis, and photoluminescence PL. The UV–visible spectra exhibited distinct absorption peaks at around 200 and 405 nm, which attributed to the occurrence of surface Plasmon reson
Fiber‐reinforced elastic laminated composites are extensively used in several domains owing to their high specific stiffness and strength and low specific density. Several studies were performed to ascertain the factors that affect the composite plates’ dynamic properties. This study aims to derive a mathematical model for the dynamic response of the processed composite material in the form of an annular circular shape made of polyester/E‐glass composite. The mathematical model was developed based on modified classical annular circular plate theory under dynamic loading, and all its formulas were solved using MATLAB 2023. The mathematical model was also verified with real experimental work involving the vibration test of the f
... Show MoreThe present study is entitled “Problems of Translating Holy Qur’an Antonyms into German: An Analytical Study”. It discusses some of the problems of translating Holy Qur’an verses that contain words so opposite in meaning to another word. The main concern of the study stresses some of the errors in translating the oppositeness of certain words of Holy Qur’an from Arabic into other languages like German, a problem that can be traced back to the fact that such words may have two opposites in meaning, one is considered and the other is completely neglected.
The errors in translating al Qur’an Antonyms can be summarized for several reasons: literal translation, ignorance of the different view
... Show MorePharmaceutical care is a patient-centered, outcomes oriented practice that requires the pharmacist to work in concert with the patient and the patient’s other healthcare providers to promote health, to prevent disease, and to assess, monitor, initiate, and modify medication use to assure that drug therapy regimens are safe and effective. In addition, the presence of clinical pharmacists has led to a higher quality of patient education and provision of complete detailed information for patients. In developed countries Pharm D has become the professional degree for practice of Pharmacy. The graduates will be enrolled in a pharmacy residency program; admission to the residency programs is available to Pharm D graduates of an accredit
... Show MoreThyroid hemiagenesis (THA) is a rare congenital anomaly in which one lobe of thyroid gland fails to develop during embryological stage. Agenesis may be unilateral, total or isthmic. Left thyroid lobe is more commonly involved than right lobe in hemiagenesis. Agenesis of the isthmus was seen in 50% of cases. Left sided hemiagenesis is more common than right sided hemiagenesis with a Left to right ratio of 4:1. Clinically patients can be euthyroid, hypothyroid or hyperthyroid. Often it is diagnosed as an incidental finding during ultrasonography (USG) study of neck, which can easily diagnose this condition.
Actual incidence of THA is unknown; most cases are diagnosed in patients admitted for thyroid scan or thyroid surgery because
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe using of recycled aggregates from construction and demolition waste (CDW) can preserve natural aggregate resources, reduce the demand for landfill, and contribute to a sustainable built environment. Concrete demolition waste has been proven to be an excellent source of aggregates for new concrete production. At a technical, economic, and environmental level, roller compacted concrete (RCC) applications benefit various civil construction projects. Roller Compacted Concrete (RCC) is a homogenous mixture that is best described as a zero-slump concrete placed with compacting equipment, uses in storage areas, dams, and most often as a basis for rigid pavements. The mix must be sufficiently dry to support
... Show MoreIt has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlighting the diff
... Show MoreMelanoides tuberculata (O. F. Müller, 1774), a freshwater snail native to eastern Mediterranean, eastern Africa, southeast Asia, southern Asia, India, and Malaysia, it is an effective invader and is now nearly globally distributed. This snail has been studied with interest because of its rapidly distributed, and because of being can serve as compatible intermediate host for many of trematodes in the world. We have summarized information from many articles in order to highlight the most important aspects of this invader snail life.
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More