It is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy inference system and genetic algorithm. An offset field data was collected from mud logging and wire line log from East Baghdad oil field south region to build the AI models, including datasets of two wells: well 1 for AI modeling and well 2 for validation of the obtained results. The types of interesting formations are sandstone and shale (Nahr Umr and Zubair formations). Nahr Umr and Zubair formations are medium –harder. The prediction results obtained from this study showed that the ANN technique can predict the ROP with high efficiency as well as FIS technique could achieve reliable results in predicting ROP, but GA technique has shown a lower efficiency in predicting ROP. The correlation coefficient and RMSE were two criteria utilized to evaluate and estimate the performance ability of AI techniques in predicting ROP and comparing the obtained results. In the Nahr Umr and Zubair formations, the obtained correlation coefficient values for training processes of ANN, FIS and GA were 0.94, 0.93, and 0.76 respectively. Data sets from another well (well 2) in the same field of interest were utilized to validate of the developed models. Datasets of well 2 were conducted against sandstone and shale formations (Nahr Umr and Zubair formations). The results revealed a good matching between the actual rate of penetration values and the predicted ROP values using two artificial intelligence techniques (neural network, and fuzzy inference technique). In contrast, the genetic algorithm model showed overestimation/ underestimation of the rate of penetration against sandstone and shale formations. This means that the optimum prediction of rate of penetration can be obtained from neural network model rather than using genetic algorithm and genetic algorithm techniques. The developed model can be successfully used to predict the rate of penetration and optimize the drilling parameters, achieving reduce the cost and time of future wells that will be drilled in the East Baghdad Iraqi oil field.
The need for information web-searching is needed by many users nowadays. They use the search engines to input their query or question and wait for the answer or best search results. As results to user query the search engines many times may be return irrelevant pages or not related to information need. This paper presents a proposed model to provide the user with efficient and effective result through search engine, based on modified chicken swarm algorithm and cosine similarity to eliminate and delete irrelevant pages(outliers) from the ranked list results, and to improve the results of the user's query . The proposed model is applied to Arabic dataset and use the ZAD corpus dataset for 27
... Show MoreThe research aims at showing the media awareness for Students, especially for the students of the preparatory schools through their following the mass media in forming the cultural, educational and political database. It also aims at building a content and prospectives that make them a wide awake stratum that safeguard the society which has faced huge effects of terrorist actions.
Furthermore, it aims at knowing to what extent that students have been acquainted with the printed and electronic newspapers. Finally, it aims at knowing to what extent that they are content with the mass media in covering and
... Show MoreInternet of Vehicle (IoV) is one of the most basic branches of the Internet of Things (IoT), which provides many advantages for drivers and passengers to ensure safety and traffic efficiency. Most IoV applications are delay-sensitive and require resources for data storage and computation that cannot be afforded by vehicles. Thus, such tasks are always offloaded to more powerful nodes, like cloud or fog. Vehicular Fog Computing (VFC), which extends cloud computing and brings resources closer to the edge of the network, has the potential to reduce both traffic congestion and load on the cloud. Resources management and allocation process is very critical for satisfying both user and provider needs. However, th
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThis paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreDrug solubility and dissolution remain a significant challenge in pharmaceutical formulations. This study aimed to formulate and evaluate repanglinide (RPG) nanosuspension-based buccal fast-dissolving films (BDFs) for dissolution enhancement. RPG nanosuspension was prepared by the antisolvent-precipitation method using multiple hydrophilic polymers, including soluplus®, polyvinyl alcohol, polyvinyl pyrrolidine, poloxamers, and hydroxyl propyl methyl cellulose. The nanosuspension was then directly loaded into BDFs using the solvent casting technique. Twelve formulas were prepared with a particle size range of 81.6-1389 nm and PDI 0.002-1 for the different polymers. Nanosuspensions prepared with soluplus showed a favored mean particle size o
... Show MoreHigh peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show More