ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with the well. Many bases on which well probes are depend on obtaining information, and preventing the rocks from responding to stimuli sent by special devices, whether those stimuli are electrical, radioactive, or acoustic. In addition, there are electrically controlled mechanical bases used to measure the diameter of the well, its flow, pressure, perforation, and taking samples. Wireline refers to the technique of using the cable to deliver special equipment to the bottom of the well to repair, evaluation, or equipment recovery. A simple wireline consists of a shiny metal wire (called a slickline) that is very durable for tensile and wear operations. It is of (0.108" or 0.125") diameter. The equipment is installed at the end of the wire. Still, sometimes a braided cable is used from many small steel wires (Braided line), which makes it stronger and heavier than the first type. The information obtained from the logs is considered to assess geological areas based on porosity, permeability, hydrocarbon fluids, and shale ratio. Well logging uses logs that are much cheaper than core operations and also cheaper than the information obtained from drilling mud. This review aims to pinpoint on the most important logging processes used in oil wells, as well logs have an effective role in all stages of the oil industry.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreReceipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the cont
... Show MoreBackground: Surgery is one and may be the most effective method to treat obesity. In the last decade, Laparoscopic Sleeve Gastrectomy is perceived to be less invasive, technically simple, less morbid and more popular form of bariatric surgery.
Objectives: This study aims to assess the effect of Laparoscopic Sleeve Gastrectomy on Fasting Blood Glucose Levels and Blood Pressure.
Methods: A prospective controlled study in which 50 obese patients were involved, 36 of patients have hypertension and type 2 diabetes mellitus , 7 patients have type 2 diabetes mellitus only, and 7 patients don’t have hypertension or type 2 diabetes. All patients were submitted to Laparosco
... Show MoreEnvironmental Control Systems form one of the integral tasks of the designer, resulting from his/her acquaintance with the nature of sites and the way they are deployed to achieve modern space entity which is witnessing significant development in the field of interior design.Good deployment of these systems offer us, as designers, high potential and several varied solutions to configure internal spaces characterised as a fertile field of study and knowledge.The research problem was identified in the marginalisation of the importance of Environmental Control Systems as an important designing factor to achieve integrated design. The research problem was demonstrated in Chapter One, along with defining the objectives and formulating
This research deals with the aesthetics of describing nature and the joys of urban life in the environment of Fatimid Egypt, among a group of poets, who were deceived by its enchanting beauty and breathtaking scenery, through it they depicted the reality of the life they live, and the things that involved them, as well as showing their personal culture, and the joys of life that experience, articulating this with a descriptive and analytical study, focusing on how the poet portrayed the visual scene, in an important stage of Arabic literature in Egypt.
<p>The objective of this paper is to study the dynamical behavior of an aquatic food web system. A mathematical model that includes nutrients, phytoplankton and zooplankton is proposed and analyzed. It is assumed that, the phytoplankton divided into two compartments namely toxic phytoplankton which produces a toxic substance as a defensive strategy against predation by zooplankton, and a nontoxic phytoplankton. All the feeding processes in this food web are formulating according to the Lotka-Volterra functional response. This model is represented mathematically by the set of nonlinear differential equations. The existence, uniqueness and boundedness of the solution of this model are investigated. The local and global stability
... Show MoreResearch in the field of biometric simulation is in the design of various and various industrial products, but it still needs new studies and research that are compatible with scientific and technological development, especially in the field of computing. Recognition, deduction, and simulation of nature, for example, the use of animal bones as tools in cutting, hunting or fighting, in addition to the use of animal drawings in cave drawings as symbols of strength, as well as dance movements and face painting to simulate the natural reality that surrounds humans. This trend developed to include simulation of nature in the formal and functional aspect to reach To vocabulary and solutions that help man in his daily life, the research probl
... Show MoreSara and other kid's Agony: - Back to Innocence to Save Iraq
The human being is a social being and human communication is a fundamental axis in the process of social interaction, and the characteristic of social shyness grows through the interaction of the individual with his environment. Identifying the level of shyness among university students, and identifying the differences in shyness among university students according to specialization (scientific, humanities). In order to achieve the objectives of the research, the researcher prepared a measure of shyness based on Zimbardo's theory, and the components that he identified are the (behavioral, cognitive, and emotional components). The validity and reliability were calculated using the Cronbach's alpha method, reaching (0.94), and the scale in
... Show More