ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with the well. Many bases on which well probes are depend on obtaining information, and preventing the rocks from responding to stimuli sent by special devices, whether those stimuli are electrical, radioactive, or acoustic. In addition, there are electrically controlled mechanical bases used to measure the diameter of the well, its flow, pressure, perforation, and taking samples. Wireline refers to the technique of using the cable to deliver special equipment to the bottom of the well to repair, evaluation, or equipment recovery. A simple wireline consists of a shiny metal wire (called a slickline) that is very durable for tensile and wear operations. It is of (0.108" or 0.125") diameter. The equipment is installed at the end of the wire. Still, sometimes a braided cable is used from many small steel wires (Braided line), which makes it stronger and heavier than the first type. The information obtained from the logs is considered to assess geological areas based on porosity, permeability, hydrocarbon fluids, and shale ratio. Well logging uses logs that are much cheaper than core operations and also cheaper than the information obtained from drilling mud. This review aims to pinpoint on the most important logging processes used in oil wells, as well logs have an effective role in all stages of the oil industry.
Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreLentic ecosystems are important for fish production and are a critical habitat for waterfowl and numerous migratory birds. In this study we have gathered data on primary productivity of lakes across Iraq to provide updated information to strategize conservation and management. Tigris and Euphrates rivers are the primary sources of filling up major lakes in Iraq the overall assessment shows that the primary productivity is dependent on the algal composition and environmental factors with coincident role of macrophytes. An average of 37 to 637 mg carbon/m3/day of primary productivity was calculated for most of the lakes comprised of Bacillariophyceae and followed by
Interface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how the bonding strength
... Show MoreAmygdalin (d-Mandelonitrile 6-O-β-d-glucosido-β-d-glucoside) and its semi synthetic product is Laetrile ( also called vitamin B17): a natural cyanogenic glycoside occurring in the seeds of some edible plants, such as bitter almonds and peaches. Early in the 19th century, Amygdalin was first isolated in 1830 by two French chemists, Robiquet and Boutron-Charlard, as active components in various fruit pits and raw nuts. However, the systematized study of vitamin B17 started when chemist Bohn (1802) discovered that a hydrocyanic acid is released during distillation of the water from bitter almonds. The various pharmacological effects of Laetrile include antiatherogenic, activity in renal fibrosis, pulmonary fibrosis, immune regulation, ant
... Show MoreThis paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
Smishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreBackground: The transcriptional control of various cell types, especially in the development or functioning of immune system cells involved in either promoting or inhibiting the immune response against cancer, is significantly influenced by DNA or RNA methylation. Multifaceted interconnections exist between immunological or cancer cell populations in the tumor's microenvironment (TME). TME alters the fluctuating DNA (as well as RNA) methylation sequences in these immunological cells to change their development into pro- or anti-cancer cell categories (such as T cells, which are regulatory, for instance). Objective: This review highlights the impact of DNA and RNA methylation on myeloid and lymphoid cells, unraveling their intricate
... Show More