Preferred Language
Articles
/
tha-GIcBVTCNdQwCcDaT
Introduction and Investigation into Oil Well Logging Operations (Review)
...Show More Authors

ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with the well. Many bases on which well probes are depend on obtaining information, and preventing the rocks from responding to stimuli sent by special devices, whether those stimuli are electrical, radioactive, or acoustic. In addition, there are electrically controlled mechanical bases used to measure the diameter of the well, its flow, pressure, perforation, and taking samples. Wireline refers to the technique of using the cable to deliver special equipment to the bottom of the well to repair, evaluation, or equipment recovery. A simple wireline consists of a shiny metal wire (called a slickline) that is very durable for tensile and wear operations. It is of (0.108" or 0.125") diameter. The equipment is installed at the end of the wire. Still, sometimes a braided cable is used from many small steel wires (Braided line), which makes it stronger and heavier than the first type. The information obtained from the logs is considered to assess geological areas based on porosity, permeability, hydrocarbon fluids, and shale ratio.  Well logging uses logs that are much cheaper than core operations and also cheaper than the information obtained from drilling mud. This review aims to pinpoint on the most important logging processes used in oil wells, as well logs have an effective role in all stages of the oil industry.

Crossref
View Publication
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Composition and Temperature Dependence of Excess Volume of Heavy Oil-Stocks Mixtures + (Gas oil or Toluene or Reformate)
...Show More Authors

Binary mixtures of three, heavy oil-stocks was subjected to density measurements at temperatures of 30, 35 and 40 °C. and precise data was acquired on the volumetric behavior of these systems. The results are reported in terms of equations for excess specific volumes of mixtures. The heavy oil-stocks used were of good varity, namely 40 stock, 60 stock, and 150 stock. The lightest one is 40 stock with °API gravity 33.69 while 60 stock is a middle type and 150 stock is a heavy one, with °API gravity 27.74 and 23.79 respectively. Temperatures in the range of 30-40 °C have a minor effect on excess volume of heavy oil-stock binary mixture thus, insignificant expansion or shrinkage is observed by increasing the temperature this effect beco

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Polyamide (Nylon 6) Micro-Particles Incorporation into RTV Maxillofacial Silicone Elastomer on Tear and Tensile Strength
...Show More Authors

Background: The longevity of any prosthesis depends on the materials from which it was fabricated, that is why, defects in the material properties may reduce the service life of prosthesis and necessitate its replacement. The aim of this study was to evaluate the effect of adding different concentrations of Polyamide-6 (Nylon-6) on the tear and tensile strength of A-2186 RTV silicone elastomer. Materials and Methods: 80 samples were fabricated by the addition of 0%, 1%, 3% and 5% by weight PA-6 micro-particles powder to A-2186 platinum RTV silicone elastomer. The study samples were divided into four (4) groups, each group containing 20 samples. One control group was prepared without PA-6 micro particles and three experimental groups were pr

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Polyamide (Nylon 6) Micro-Particles Incorporation into RTV Maxillofacial Silicone Elastomer on Tear and Tensile Strength
...Show More Authors

View Publication
Crossref (10)
Crossref
Publication Date
Sun Oct 12 2014
Journal Name
Advanced Studies In English, Pune
Cohesive Devices in Hemingway's 'For Whom The Bell Tolls' and its Translation into Arabic
...Show More Authors

BN Rashid, AJES, 2014

View Publication
Publication Date
Fri Dec 25 2015
Journal Name
Iraqi Dental Journal
Comparison of Some Mechanical Properties of Silanated SiO2 and Polyester Fiber Composite Incorporation into Heat Cured Acrylic Resin.
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Dec 21 2025
Journal Name
International Journal Of Veterinary Sciences And Animal Husbandry
Review of multidrug sensitivity and resistance in enterococcus
...Show More Authors

Review of multidrug sensitivity and resistance in enterococcus

View Publication Preview PDF
Publication Date
Sun Dec 21 2025
Journal Name
Philosophy Journal
Critical-cultural discourse and review of political action
...Show More Authors

View Publication
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (16)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Urban Form Elements and Urban Potentiality ( Literature Review)
...Show More Authors

Morphological theories shape the leading platform to theoretically and practically consider the assets connected with the emergence of the city, and its growth and development over time. In this paper, five elements of the urban form are typified: structure/tissue, plot, building, block, and the street pattern will be addressed. Understanding the urban form at the different levels within its ingredients could lead to shape a base launch of how to consider the potentiality of the development and sustainability of a particular area.   

View Publication Preview PDF
Crossref (6)
Crossref