Results 71 to 80 of about 3,301,048 (293)
The cross plotting of rock properties for fluid and lithology discrimination was carried out in a Niger Delta oil field using well data X-26 from a given oil field in the coastal swamp depobelt. The data used for the analysis consisted of suites of logs,
Okoli Emeka Austin +3 more
doaj +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Echoes from Below: A Systematic Review of Cement Bond Log Innovations Through Global Patent Analysis
Maintaining well integrity is essential in the oil and gas industry to prevent environmental hazards, operational risks, and economic losses. Cement bond log (CBL) tools are essential in evaluating cement bonding and ensuring wellbore stability.
Lim Shing Wang +2 more
doaj +1 more source
Well log analysis by use of neural network.
The present paper proposes the algorithm for well log data analysis by use of neural network.The designated network is the layered network which consists of an input layer, one hidden layer and an output layer. The unit numbers of input layer and output layer are equal to well log curve to be inputted and the lithology to be outputted, respectively ...
Yuzuru Ashida, Akira Itoh
openaire +2 more sources
Low-ionization structures in planetary nebulae - I: physical, kinematic and excitation properties
Though the small-scale, low-ionization knots, filaments and jets (LISs) of planetary nebulae (PNe) are known for ~30yr, some of their observational properties are not well established.
Akras, Stavros, Gonçalves, Denise R.
core +1 more source
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
Advanced Persistent Threats (APTs) are a main impendence in cyber security of computer networks. In 2015, a successful breach remains undetected 146 days on average, reported by [Fi16].With our work we demonstrate a feasible and fast way to analyse real ...
Schindler, Timo
core +1 more source
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau +36 more
wiley +1 more source
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang +12 more
wiley +1 more source
This paper presents a case study on the application of simultaneous inversion (SI) technique and well log analysis to accurately seismic-geomechanical characterization of Asmari formation in an Iranian oil field.
Ahsan Leisi, Navid Shad Manaman
doaj +1 more source

