Preferred Language
Articles
/
JIa4RIYBIXToZYALgYGp
Development of Artificial Intelligence Models for Estimating Rate of Penetration in East Baghdad Field, Middle Iraq
...Show More Authors

It is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy inference system and genetic algorithm. An offset field data was collected from mud logging and wire line log from East Baghdad oil field south region to build the AI models, including datasets of two wells: well 1 for AI modeling and well 2 for validation of the obtained results. The types of interesting formations are sandstone and shale (Nahr Umr and Zubair formations). Nahr Umr and Zubair formations are medium –harder. The prediction results obtained from this study showed that the ANN technique can predict the ROP with high efficiency as well as FIS technique could achieve reliable results in predicting ROP, but GA technique has shown a lower efficiency in predicting ROP. The correlation coefficient and RMSE were two criteria utilized to evaluate and estimate the performance ability of AI techniques in predicting ROP and comparing the obtained results. In the Nahr Umr and Zubair formations, the obtained correlation coefficient values for training processes of ANN, FIS and GA were 0.94, 0.93, and 0.76 respectively. Data sets from another well (well 2) in the same field of interest were utilized to validate of the developed models. Datasets of well 2 were conducted against sandstone and shale formations (Nahr Umr and Zubair formations). The results revealed a good matching between the actual rate of penetration values and the predicted ROP values using two artificial intelligence techniques (neural network, and fuzzy inference technique). In contrast, the genetic algorithm model showed overestimation/ underestimation of the rate of penetration against sandstone and shale formations. This means that the optimum prediction of rate of penetration can be obtained from neural network model rather than using genetic algorithm and genetic algorithm techniques. The developed model can be successfully used to predict the rate of penetration and optimize the drilling parameters, achieving reduce the cost and time of future wells that will be drilled in the East Baghdad Iraqi oil field.

Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Minar International Journal Of Applied Sciences And Technology
INNOVATE GESTATIONAL AGE ESTIMATION MODEL FOR IRAQI FETUSES BASED ON ULTRASOUND IMAGES MEASUREMENTS
...Show More Authors

Imaging by Ultrasound (US) is an accurate and useful modality for the assessment of gestational age (GA), estimation fetal weight, and monitoring the fetal growth during pregnancy, is a routine part of prenatal care, and that can greatly impact obstetric management. Estimation of GA is important in obstetric care, making appropriate management decisions requires accurate appraisal of GA. Accurate GA estimation may assist obstetricians in appropriately counseling women who are at risk of a preterm delivery about likely neonatal outcomes, and it is essential in the evaluation of the fetal growth and detection of intrauterine growth restriction. There are many formulas are used to estimate fetal GA in the world, but it's not specify fo

... Show More
View Publication
Crossref
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Design Comparison between the Gravity and Pressure Sand Filters for Water Treatment, Review
...Show More Authors

Hygienic engineering has dedicated a lot of time and energy to studying water filtration because of how important it is to human health. Thorough familiarity with the filtration process is essential for the design engineer to keep up with and profit from advances in filtering technology and equipment as the properties of raw water continue to change. Because it removes sediment, chemicals, odors, and microbes, filtration is an integral part of the water purification process. The most popular technique for treating surface water for municipal water supply is considered fast sand filtration, which can be achieved using either gravity or pressure sand filters. Predicting the performance of units in water treatment plants is a basic pri

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparison between Rowatinex and Tamsulosin as a Medical Expulsion Therapy for Ureteral Stone
...Show More Authors

The objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.

Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.

Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 02 2022
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
Mpeg-Dash System via HTTP2 Protocol with HEVC Encoder for Video Streaming Services
...Show More Authors

MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besi

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Int. J. Eng. Ra
Pressure Gradient Influence on MHD Flow for Generalized Burgers’ Fluid with Slip Condition
...Show More Authors

This paper presents a research for magnetohydrodynamic (MHD) flow of an incompressible generalized Burgers’ fluid including by an accelerating plate and flowing under the action of pressure gradient. Where the no – slip assumption between the wall and the fluid is no longer valid. The fractional calculus approach is introduced to establish the constitutive relationship of the generalized Burgers’ fluid. By using the discrete Laplace transform of the sequential fractional derivatives, a closed form solutions for the velocity and shear stress are obtained in terms of Fox H- function for the following two problems: (i) flow due to a constant pressure gradient, and (ii) flow due to due to a sinusoidal pressure gradient. The solutions for

... Show More
View Publication
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 29 2018
Journal Name
Journal Of Engineering
Zeta Potential, Effective Membrane Charge and Donnan Potential for TiO2 NF Ceramic Membrane
...Show More Authors

Nanofiltration (NF) ceramic membrane have found increasing applications particularly in wastewater and water treatment. In order to estimate and optimize the performance of NF membranes, the membrane should be characterized correctly in terms of their basic parameters such as effective pore radius (rp) and equivalent effective thickness as well as effective surface charge ( ), the effective charge density ( ) and Donnan potential ( ). The impact of electrokinetic (zeta) potential on the membrane surface charge density, effective membrane charge density and Donnan potential at two different concentrations of the reference solutions 0.001, 0.01 M sodium chloride at various pH values from 3 to 9, and effective po

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Ieee Transactions On Industrial Electronics
Cascaded-Extended-State-Observer-Based Sliding-Mode Control for Underactuated Flexible Joint Robot
...Show More Authors

This article presents a new cascaded extended state observer (CESO)-based sliding-mode control (SMC) for an underactuated flexible joint robot (FJR). The control of the FJR has many challenges, including coupling, underactuation, nonlinearity, uncertainties and external disturbances, and the noise amplification especially in the high-order systems. The proposed control integrates the CESO and SMC, in which the CESO estimates the states and disturbances, and the SMC provides the system robustness to the uncertainty and disturbance estimation errors. First, a dynamic model of the FJR is derived and converted from an underactuated form to a canonical form via the Olfati transformation and a flatness approach, which reduces the complexity of th

... Show More
View Publication
Scopus (160)
Crossref (147)
Scopus Clarivate Crossref
Publication Date
Thu Sep 04 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Hotspot Issue Handling and Reliable Data Forwarding Technique for Ocean Underwater Sensor Networks
...Show More Authors

Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising technology for a wide range of ocean monitoring applications. The UWSNs suffer from unique challenges of the underwater environment, such as dynamic and sparse network topology, which can easily lead to a partitioned network. This results in hotspot formation and the absence of the routing path from the source to the destination. Therefore, to optimize the network lifetime and limit the possibility of hotspot formation along the data transmission path, the need to plan a traffic-aware protocol is raised. In this research, we propose a traffic-aware routing protocol called PG-RES, which is predicated on the ideas of Pressure Gradient and RESistance concept. The proposed

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref