Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and anomalous rock faces. Furthermore, the paper explores the adoption of advanced methods, including hydraulic flow units (HFU), providing a fine-grained understanding of reservoir heterogeneity and contributing to the prediction of flow dynamics. The final section includes structural geological models, petrophysical data collected, rock type classification, and spatial data to better represent the reservoir bottom structure. It provides a valuable resource for researchers, geologists, and engineers seeking to characterize reservoirs and make optimal decisions on hydrocarbon exploration and production. It is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling.
mixtures of cyclohexane + n-decane and cyclohexane + 1-pentanol have been measured at 298.15, 308.15, 318.15, and 328.15 K over the whole mole fraction range. From these results, excess molar volumes, VE , have been calculated and fitted to the Flory equations. The VE values are negative and positive over the whole mole fraction range and at all temperatures. The excess refractive indices nE and excess viscosities ?E have been calculated from experimental refractive indices and viscosity measurements at different temperature and fitted to the mixing rules equations and Heric – Coursey equation respectively to predict theoretical refractive indices, we found good agreement between them for binary mixtures in this study. The variation of th
... Show Moreالهدف من الدراسه تحضير فئه جديده من بوليمرات السليكون P1-P4 والتي تمت على اساس استحدام ثنائي مثيل ثنائي كلورو سيلان((DCDMS مع بعض المركبات العضويه التي تحتوي مجاميع الهيدروكسيل الطرفيه والتي حضرت لاول مره M1-M4، بأستخدم البلمره التكثيفيه .كما تم تحضير متراكباتها النانويهP′1-P′4 بوجود جسيمات الفضه النانويه (Ag-NPs) باستخدام طريقة صب المحاليل. شخصت جميع التراكيب للمونمرات والبوليمرات المحضره باستخدام مطيافية
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreNimodipine (NMD) is a dihydropyridine calcium channel blocker useful for the prevention and treatment of delayed ischemic effects. It belongs to class ? drugs, which is characterized by low solubility and high permeability. This research aimed to prepare Nimodipine nanoparticles (NMD NPs) for the enhancement of solubility and dissolution rate. The formulation of nanoparticles was done by the solvent anti-solvent technique using either magnetic stirrer or bath sonicator for maintaining the motion of the antisolvent phase. Five different stabilizers were used to prepare NMD NPs( TPGS, Soluplus®, HPMC E5, PVP K90, and poloxamer 407). The selected formula F2, in which Soluplus
has been utilized as a stabilizer, has a par
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThe occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More