It is well known that drilling fluid is a key parameter for optimizing drilling operations, cleaning the hole, and managing the rig hydraulics and margins of surge and swab pressures. Although the experimental works represent valid and reliable results, they are expensive and time consuming. In contrast, continuous and regular determination of the rheological fluid properties can perform its essential functions during good construction. The aim of this study is to develop empirical models to estimate the drilling mud rheological properties of water-based fluids with less need for lab measurements. This study provides two predictive techniques, multiple regression analysis and artificial neural networks, to determine the rheological properties of water-based drilling fluid using other simple measurable properties. While mud density, marsh funnel, and solid% are key input parameters in this study, the output models are plastic viscosity, yield point, apparent viscosity and gel strength. The prediction methods have been applied on datasets taken from the final reports of two wells drilled in the Ahdeb oil field, eastern Iraq. To test the performance ability of the developed models, two error-based metrics (determination coefficient R2 and root mean square error have been used in this study. The current results support the evidence that MW, MF, and solid% are consistent indexes for the prediction of rheological mud properties. Both mud density and solid content have a relative-significant effect on increasing PV, YP, AV, and gel strength. The results also reveal that both MRA and ANN are conservative in estimating the fluid rheological properties, but ANN is more precise than MRA. Eight empirical mathematical models with high performance capacity have been developed in this study to determine the rheological fluid properties using simple and quick equipment such as mud balance and marsh funnel. This study presents cost-effective models to determine the rheological fluid properties for future well planning in Iraqi oil fields.
Joints are among the most widespread geologic structures as they are found in most each exposure of rock. They differ greatly in appearance, dimensions, and arrangement, besides they occur in quite different tectonic environments. This study is important because joints provide evidence on what kind of stress produced them (history of deformation) and also because they change the characteristics of the rocks in which they occur. The Measured data of joints from the studied area which are located in the high folded zone – Northeast of Iraq, were classified according to their relationship with the tectonic axes by projecting them stereographically using Schmidt net in GEOrient ver.9.5.0 software. The joint systems revealed the orientation of
... Show MoreThis research deal the primary and secondary sedimentary structures in the By Hassan Formation in the three locations in the northeast of Iraq. Can be recognize many geological structures such as cross bedding, planer bedding, graded bedding, channel structure and mud ball house deposit in the flood plain. The ether side this research study the direction of old current and sedimentary structure that made by the one direction current
The objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreIn the present study, an attempt has been to develop a new water quality index (WQI) method that depends on the Iraqi specifications for drinking water (IQS 417, 2009) to assess the validity of the Euphrates River for drinking by classifying the quality of the river water at different stations along its entire reach inside the Iraqi lands. The proposed classifications by this method are: Excellent, Good, Acceptable, Poor, and Very poor. Eight water quality parameters have been selected to represent the quality of the river water these are: Ion Hydrogen Concentration (pH), Calcium (Ca), Magnesium (Mg), Sodium (Na), Chloride (Cl), Sulphate (SO_4), Nitrate (NO_3), and Total Dissolved Solids (TDS). The variation of the water quality p
... Show MoreIn the present study, an attempt has been to develop a new water quality index (WQI) method that depends on the Iraqi specifications for drinking water (IQS 417, 2009) to assess the validity of the Euphrates River for drinking by classifying the quality of the river water at different stations along its entire reach inside the Iraqi lands. The proposed classifications by this method are: Excellent, Good, Acceptable, Poor, and Very poor. Eight water quality parameters have been selected to represent the quality of the river water these are: Ion Hydrogen Concentration (pH), Calcium (Ca), Magnesium (Mg), Sodium (Na), Chloride (Cl), Sulphate (SO_4), Nitrate (NO_3), and Total Dissolved Solids (TDS). The variation of the water quality parameters
... Show MoreRadiation therapy plays an important role in improving breast cancer cases, in order to obtain an appropriateestimate of radiation doses number given to the patient after tumor removal; some methods of nonparametric regression werecompared. The Kernel method was used by Nadaraya-Watson estimator to find the estimation regression function forsmoothing data based on the smoothing parameter h according to the Normal scale method (NSM), Least Squared CrossValidation method (LSCV) and Golden Rate Method (GRM). These methods were compared by simulation for samples ofthree sizes, the method (NSM) proved to be the best according to average of Mean Squares Error criterion and the method(LSCV) proved to be the best according to Average of Mean Absolu
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreWellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It
... Show More