Preferred Language
Articles
/
9BiYRpcBVTCNdQwCMJZv
Optimizing Well Placement with Genetic Algorithms: A Case Study
...Show More Authors

Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a type of stochastic optimization technique that has proven effective in solving various problems. The results of the study show significant improvements in NPV when using genetic algorithms compared to traditional methods, particularly for problems with numerous decision variables. The findings suggest that genetic algorithms are a promising tool for optimizing well placement in oil field development, improving NPV, and reducing the risk of project failure.

Crossref
View Publication
Publication Date
Fri Mar 01 2024
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Analyzing the behavior of different classification algorithms in diabetes prediction
...Show More Authors

<span lang="EN-US">Diabetes is one of the deadliest diseases in the world that can lead to stroke, blindness, organ failure, and amputation of lower limbs. Researches state that diabetes can be controlled if it is detected at an early stage. Scientists are becoming more interested in classification algorithms in diagnosing diseases. In this study, we have analyzed the performance of five classification algorithms namely naïve Bayes, support vector machine, multi layer perceptron artificial neural network, decision tree, and random forest using diabetes dataset that contains the information of 2000 female patients. Various metrics were applied in evaluating the performance of the classifiers such as precision, area under the c

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Stamps extraction using local adaptive k- means and ISODATA algorithms
...Show More Authors

<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
B-splines Algorithms for Solving Fredholm Linear Integro-Differential Equations
...Show More Authors

Algorithms using the second order of B -splines [B (x)] and the third order of B -splines [B,3(x)] are derived to solve 1' , 2nd and 3rd linear Fredholm integro-differential equations (F1DEs). These new procedures have all the useful properties of B -spline function and can be used comparatively greater computational ease and efficiency.The results of these algorithms are compared with the cubic spline function.Two numerical examples are given for conciliated the results of this method.

View Publication Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Al-khwarizmi Engineering Journal
Noise Removal of ECG Signal Using Recursive Least Square Algorithms
...Show More Authors

This paper shows an approach for Electromyography (ECG) signal processing based on linear and nonlinear adaptive filtering using Recursive Least Square (RLS) algorithm to remove two kinds of noise that affected the ECG signal. These are the High Frequency Noise (HFN) and Low Frequency Noise (LFN). Simulation is performed in Matlab. The ECG, HFN and LFN signals used in this study were downloaded from ftp://ftp.ieee.org/uploads/press/rangayyan/, and then the filtering process was obtained by using adaptive finite impulse response (FIR) that illustrated better results than infinite impulse response (IIR) filters did.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Reviews In Agricultural Science
Technological Advances in Soil Penetration Resistance Measurement and Prediction Algorithms
...Show More Authors

Soil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use

... Show More
View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Fri Oct 31 2025
Journal Name
Mathematical Modelling Of Engineering Problems
Modified Optimization Algorithms for Infinite Integro-Differential Equations via Generalized Laguerre Polynomials
...Show More Authors

This study emphasizes the infinite-boundary integro-differential equation. To examine the approximate solution of the problem, two modified optimization algorithms are proposed based on generalized Laguerre functions. In the first technique, the proposed method is applied to the original problem by approximating the solution using the truncated generalized Laguerre polynomial of the unknown function, optimizing coefficients through error minimization, and transforming the integro-differential equation into an algebraic equation. In contrast, the second approach incorporates a penalty term into the objective function to effectively enforce boundary and integral constraints. This technique reduces the original problem to a mathematical optimi

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Board For Medical Specializations In Dermatology And Venereology
Treatment of Cutaneous Leishmaniasis by Topical 25% Podophyllin Solution (Case-Controlled Study)
...Show More Authors

KE Sharquie, AA Noaimi, AG Al-Ghazzi, 2010 - Cited by 2

View Publication
Publication Date
Tue Sep 24 2019
Journal Name
Journal Of Petroleum Research And Studies
Lithofacies Characterization of the Early – Middle Miocene Succession, Case-Study, South Iraq
...Show More Authors

The Early – Middle Miocene Ghar and Lower Fars sedimentary succession at the representative oil-well Nu-18 of the Nahr Umr oil field south Iraq; is taken by this study to investigate the sedimentological to reservoir rock facies buildups and related reservoir zonation; as first rock-typing attempt for the both formations. The sedimentological characterization of the Early Miocene Ghar formation is mainly comprised by successive buildups of sands-gravels and sandstones, whereas; the Middle Miocene Lower Fars formation is started by limestone, limestone-marly/marl anhydritic, upgraded into interbedded-series of marl and anhydrite facies, with less-common occurrences of thin-sandstone interlayers, terminated by marl-sandy-secti

... Show More
View Publication
Crossref