نتایج جستجو برای: well logs
تعداد نتایج: 1531044 فیلتر نتایج به سال:
the harmful effects of many chemical food preservatives are well established, so this has triggered interest in natural methods of preservation. monolaurin, a monoester of lauric acid, founds naturally in some foods and has various antiviral and antibacterial activities. evaluation of the effects of monolaurin separately and in combination with lactic acid bacteria (lab) starter culture on grow...
The purpose of this study is to construct a fuzzy lithology system from well logs to identify formation lithology of a groundwater aquifer system in order to better apply conventional well logging interpretation in hydro-geologic studies because well log responses of aquifers are sometimes different from those of conventional oil and gas reservoirs. The input variables for this system are the g...
Conventional Imtrltiple regression for permeability estimation from well logs requires a functional relationship to be presumed. Due to the inexact nature of the relationship between petrophysical variables, it is not always possible to identify the underlying functional form between dependent and independent variables in advance. When large variations in metrological properties arc exhibited, ...
the log damage and value loss were examined by felling and bucking function, species, and damage type, in kheyrud forest in namkhaneh district in the hyrcanian forest of iran. in order to calculate the wood value following tree felling and bucking, 250 trees and 167 logs consisting of beech and hornbeam species were measured. there were five types of damage recorded following the tree felling o...
Gas hydrates are considered a potential energy source for the future. Rock physics modeling provides insights into elastic response of sediments containing gas hydrates, which is essential identifying using well-log data and seismic attributes. This paper establishes rock model (RPM) by employing effective medium theories to quantify properties hydrates. Specifically, proposed RPM introduces cr...
Activity logs can be used for intrusion detection; however, most previous work on intrusion detection examines only activity logs from a single component. Doing so fails to take advantage of the naturally existing correlations among activities in different types of logs, such as network logs and system call logs. This paper explores correlation for intrusion detection. Specifically, we propose ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید