ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with the well. Many bases on which well probes are depend on obtaining information, and preventing the rocks from responding to stimuli sent by special devices, whether those stimuli are electrical, radioactive, or acoustic. In addition, there are electrically controlled mechanical bases used to measure the diameter of the well, its flow, pressure, perforation, and taking samples. Wireline refers to the technique of using the cable to deliver special equipment to the bottom of the well to repair, evaluation, or equipment recovery. A simple wireline consists of a shiny metal wire (called a slickline) that is very durable for tensile and wear operations. It is of (0.108" or 0.125") diameter. The equipment is installed at the end of the wire. Still, sometimes a braided cable is used from many small steel wires (Braided line), which makes it stronger and heavier than the first type. The information obtained from the logs is considered to assess geological areas based on porosity, permeability, hydrocarbon fluids, and shale ratio. Well logging uses logs that are much cheaper than core operations and also cheaper than the information obtained from drilling mud. This review aims to pinpoint on the most important logging processes used in oil wells, as well logs have an effective role in all stages of the oil industry.
Background: Sinusitis is an inflammatory condition that affects the mucous membrane lining the airways. Chronic rhinosinusitis and acute rhinosinusitis are the two types. Rhinosinusitis is characterized by facial pain, congestion, and headache. Due to the widespread prevalence of sinusitis, there must be an evaluation of the case because the diagnoses are more serious in the advanced stages of the disease and impact the outcome of care. Objectives: The objective of this study was to conduct a literature evaluation of chronic and acute rhinosinusitis, risk factors, symptoms and signs of sinusitis, diagnostic, sinusitis treatment, and antibiotic treatment, as well as new databases. Conclusion:
... Show MorePrevious studies on the synthesis and characterization of metal chelates with uracil by elemental analysis, conductivity, IR, UV-Vis, NMR spectroscopy, and thermal analysis were covered in this review article. Reviewing these studies, we found that uracil can be coordinated through the electron pair on the N1, N3, O2, or O4 atoms. If the uracil was a mono-dentate ligand, it will be coordinated by one of the following atoms: N1, N3 or O2. But if the uracil was bi-dentate ligand, it will be coordinated by atoms N1 and O2, N3 and O2 or N3 and O4. However, when uracil forms complexes in the form of polymers, coordination occurs through the following atoms: N1 and N3 or N1 and O4.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Variation in DNA, and genes to a lesser or greater extent, can play an important role in most diseases; that is because this variation in will reflect and affect the function of DNA, and genes (combined genes and DNA or separately). This can be affected by environment, life style, as well as the inheriting from parents and previous generations. All these factors can contribute in human diseases. There are different alterations in genes, like imbalance and inequality in chromosomes, disorder in gene (deficiency in gene, which could be complex or single disorder), and cancer. In the last decades, scientists were focus on medicine and genetics; they pay an extensive attention to reach better understanding about diseases and their cause
... Show MoreThe No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit
... Show MoreThis study presented more than twenty books that dealt with the subject of (Weights of the Tawshih art), whether their study was independent and dedicated the art of Tawshih as a part of book. Therefore, the review of the sources and references on the art of the Tawshih is not specific for place or time, it was a broad and comprehensive review of all the places where the muwashahat appeared in the east and west, Andalusia was one of the most important areas covered by the study arbic Maghreb and Iraq. The art of tawshih took different forms according to the countries in which they appeared. Muwashahat is a new art that appeared in Andalusia, its main goal was to renew the Khalilian weights and to find the poetic rhythm that fits with the so
... Show MoreHumans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th
... Show MoreDue to the spread of “Deepfake” in our society and the impact of this phenomenon on politicians, celebrities, and the privacy of individuals in particular, as well as, on the other hand, its impact on the electoral process as well as financial fraud, all these reasons prompted us to present a research paper dealing with this phenomenon. This paper presents a comprehensive review of Deepfake, how it is created, and who has produced it. This paper can be used as a reference and information source for the methods used to limit deepfake by detecting forgeries and minimizing its impact on society by preventing it. This paper reviews the results of much research in the field of deepfake, as well as the advantages of each method, a
... Show MoreMulti-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the chara
... Show More