ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with the well. Many bases on which well probes are depend on obtaining information, and preventing the rocks from responding to stimuli sent by special devices, whether those stimuli are electrical, radioactive, or acoustic. In addition, there are electrically controlled mechanical bases used to measure the diameter of the well, its flow, pressure, perforation, and taking samples. Wireline refers to the technique of using the cable to deliver special equipment to the bottom of the well to repair, evaluation, or equipment recovery. A simple wireline consists of a shiny metal wire (called a slickline) that is very durable for tensile and wear operations. It is of (0.108" or 0.125") diameter. The equipment is installed at the end of the wire. Still, sometimes a braided cable is used from many small steel wires (Braided line), which makes it stronger and heavier than the first type. The information obtained from the logs is considered to assess geological areas based on porosity, permeability, hydrocarbon fluids, and shale ratio. Well logging uses logs that are much cheaper than core operations and also cheaper than the information obtained from drilling mud. This review aims to pinpoint on the most important logging processes used in oil wells, as well logs have an effective role in all stages of the oil industry.
The topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.
The laminar fluid flow of water through the annulus duct was investigated numerically by ANSYS fluent version 15.0 with height (2.5, 5, 7.5) cm and constant length (L=60cm). With constant heat flux applied to the outer duct. The heat flux at the range (500,1000,1500,2000) w/m2 and Reynolds number values were ≤ 2300. The problem was 2-D investigated. Results revealed that Nusselt number decrease and the wall temperature increase with the increase of heat flux. Also, the average Nusselt number increase as Re increases. And as the height of the annulus increase, the values of the temperature and the local and average Nusselt number increase.
This research aims to improve the radiation shielding properties of polymer-based materials by mixing PVC with locally available building materials. Specifically, two key parameters of fast neutron attenuation (removal cross-section and half-value layer) were studied for composite materials comprising PVC reinforced with common building materials (cement, sand, gypsum and marble) in different proportions (10%, 30% and 50% by weight). To assess their effectiveness as protection against fast neutrons, the macroscopic neutron cross-section was calculated for each composite. Results show that neutron cross-section values are significantly affected by the reinforcement ratios, and that the composite material PVC + 50% gypsum is an effect
... Show MoreThe parameters of resistance spot welding (RSW) performed on low strength commercial aluminum sheets are investigated experimentally, the performance requirements and weldability issues were driven the choice of a specific aluminum alloy that was AA1050. RSW aluminum alloys has a major problem of inconsistent quality from weld to weld comparing with welding steel
alloys sheet, due to the higher thermal conductivity, higher thermal expansion, narrow plastic temperature range, and lower electrical resistivity. Much effort has been devoted to the study of describing the relation between the parameters of the process (welding current, welding time, and electrode force) and weld strength. Shear-tensile strength tests were performed to ind
Optical properties of Rhodamine-B thin film prepared by PLD
technique have been investigated. The absorption spectra using
1064nm and 532 nm laser wavelength of different laser pulse
energies shows that all the curves contain two bands, B band and Q
bands with two branches, Q1 and Q2 band and a small shift in the
peaks location toward the long wavelength with increasing laser
energy. FTIR patterns for Rhodamine-B powder and thin film within
shows that the identified peaks were located in the standard values
that done in the previous researches. X-ray diffraction patterns of
powder and prepared Rhodamine-B thin film was display that the
powder has polycrystalline of tetragonal structure, while the thin film
An experimental work has been done to study the major factors that affect the axial dispersion of some hydrocarbons during liquid-liquid miscible displacement. Kerosene and gas oil are used as displacing phase while seven liquid hydrocarbons of high purity represent the displaced phase, three of the liquids are aromatics and the rest are of paraffinic base. In conducting the experiments, two packed beds of different porosity and permeability are used as porous media.
The results showed that the displacement process is not a piston flow, breakthrough of displacing fluids are shown before one pore volume has been injected. The processes are stable with no evidence of viscous fingering.
Dispersion model as a
... Show MoreAn experimental investigation has been carried out for zinc-nickel (Zn-Ni) electro-deposition using the constant applied current technique. Weight difference approach method was used to determine the cathode current efficiency and deposit thickness. Also, the influence effect of current density on the deposition process, solderability, and porosity of the plating layer in microelectronic applications were examined. The bath temperature effect on nickel composition and the form of the contract was studied using Scanning Electron Microscope (SEM). Moreover, elemental nature of the deposition was analyzed by Energy Dispersive X-Ray (EDX).
It has been found that the best bath temperature
... Show MoreBlends of Polymethyl methacrylate (PMMA)/polyvinyl alcohol (PVA) doped with 2% weight percentage of Sn were prepared with different blend ratios using casting technique. The measurements of A.C conductivity σa.c within the frequency range (25kHz – 5MHz) of undoped and Sn doped PMMA/PVA blends obeyed the relationship σ= Aws were the value of s within the range 0 > s > 1. The results showed that σa.c increases with the increase of frequency. The exponent s showed preceding increase with the increase of PVA content for PMMA/PVA blends doped with Sn. The dielectric constant, dielectric loss, A.C electrical conductivity are varied with the concentration of PVA in the blend and frequency of applied electrical field.
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More