It is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy inference system and genetic algorithm. An offset field data was collected from mud logging and wire line log from East Baghdad oil field south region to build the AI models, including datasets of two wells: well 1 for AI modeling and well 2 for validation of the obtained results. The types of interesting formations are sandstone and shale (Nahr Umr and Zubair formations). Nahr Umr and Zubair formations are medium –harder. The prediction results obtained from this study showed that the ANN technique can predict the ROP with high efficiency as well as FIS technique could achieve reliable results in predicting ROP, but GA technique has shown a lower efficiency in predicting ROP. The correlation coefficient and RMSE were two criteria utilized to evaluate and estimate the performance ability of AI techniques in predicting ROP and comparing the obtained results. In the Nahr Umr and Zubair formations, the obtained correlation coefficient values for training processes of ANN, FIS and GA were 0.94, 0.93, and 0.76 respectively. Data sets from another well (well 2) in the same field of interest were utilized to validate of the developed models. Datasets of well 2 were conducted against sandstone and shale formations (Nahr Umr and Zubair formations). The results revealed a good matching between the actual rate of penetration values and the predicted ROP values using two artificial intelligence techniques (neural network, and fuzzy inference technique). In contrast, the genetic algorithm model showed overestimation/ underestimation of the rate of penetration against sandstone and shale formations. This means that the optimum prediction of rate of penetration can be obtained from neural network model rather than using genetic algorithm and genetic algorithm techniques. The developed model can be successfully used to predict the rate of penetration and optimize the drilling parameters, achieving reduce the cost and time of future wells that will be drilled in the East Baghdad Iraqi oil field.
Aphid Aphis spp (Hemiptera:Aphididae) and Thrips Thrips spp (Thysanoptera: Thripidae) an economically important pests on several crops in the world and Iraq, that transfer many viruses diseases to it. Field studies were conducted to assessment the population density of these insects and susceptibility of six varieties (Barin, Revera, Divela, Rudlph, Alazata and Pleny) to infestation during 2013 spring season. The results were showed that all Potato varieties were infested by Aphis and Thrips on spring plantation but with different percentage. The Divela variety was higher percentage of infestation and high population density of aphid which averaged 1.47 insect/ leaf while in Alazata was the lower population density which averaged 1.02 in
... Show MoreAbstract:
The purpose of this research is measuring relationship level and impact between Organizational Factors and their Dimensions (Leadership, Organizational Structure, Organizational Culture), and Talent Management Strategies (Talent Recruitment,Talent performance management, Talent Development, Talent Retention ). it was relied on the Questionnaire form as a basic instrument in collecting the Data by using (Likert) instrument ,which was distributed on the research Sample which number was (100) individual included (Managers of schools, assistants (scientific and Administration ) and teachers in Four schools of Talents in Iraq (Baghdad , AL-Nagaf , AL-Basra, Mesan). All fo
... Show MoreBackground: Concha bullosa is an anatomical variation which defined by pneumatizaton of middle turbinate that occurred with an incidence of (5 to 25%) in the normal population.It has the potential to cause crowding and obstruction of the middle meatus and nasal cavity. There are many surgical techniques which utilized for its management. Study goal: Is to compare the formation of adhesion between endoscopic partial lateral middle turbinectomy and middle turbinate trimming in cases of concha bullosa. Patients and methods: A prospectivecomparative clinical trial was performed in the ENT department at Al-Shahid Ghazi AL Hariri Hospital in Medical City over the period from September 2016 to August 2017. Fifty nine (59) patients {24 males
... Show MoreBegging is an ancient social phenomenon since the Man's creation. It was simple at its beginning to get a living and the family needed, but presently, this simple social phenomenon converted to a big phenomenon which controlled by competent groups away from the values and principles. Their doings are far from humanity representing by the cutting of a hand or a foot and facial distortion or removed eye as a way of attracting people's emotions to get material and incorporeal helps; these doings became a trade which is exchanged by slave traders. Furthermore, different illegal and greedy methods were followed as a way of blackmailing others; contrariwise other cases of begging are doing by a people who real poor and needy. In this case, the
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreAbstract:
This research aims to know the reflection of selection of employees strategy dimensions ( selection of employees strategy standards, procedures selection of employees strategy , efficiency based on a selection of employees strategy) on human capital (knowledge, skills, abilities) in a sample of Lecturers consists of (Deans and assistants and heads of departments) in ( Baghdad University) included nine colleges and university president as total sample size (54), which represent almost 50% of the total research community of 116, was used in the light of the objectives of the research descriptive and analytical approach, has been a resolution main tool for data collection as well as the interview p
... Show MoreLinear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust
... Show MoreThe petrophysical analysis is very important to understand the factors controlling the reservoir quality and production wells. In the current study, the petrophysical evaluation was accomplished to hydrocarbon assessment based on well log data of four wells of Early Cretaceous carbonate reservoir Yamama Formation in Abu-Amood oil field in the southern part of Iraq. The available well logs such as sonic, density, neutron, gamma ray, SP, and resistivity logs for wells AAm-1, AAm-2, AAm-3, and AAm-5 were used to delineate the reservoir characteristics of the Yamama Formation. Lithologic and mineralogic studies were performed using porosity logs combination cross plots such as density vs. neutron cross plot and M-N mineralogy plot. Thes
... Show MoreSafe drinking water is essential for the present and future generations' health. This study aims to assess drinking water quality in Baghdad's Al-Rusafa neighborhood. Water samples were taken from 32 neighborhoods on this side. The quality of the examined potable water samples differed depending on the water source. This investigation's pH, chlorine, EC, TDS, TSS, Cd, and Pb levels were below acceptable ranges. TDS levels in Al-Mada'in are more significant than acceptable (>600ppm) water levels. Bacteria have polluted six communities (Shigella, Salmonella, Escherichia coli, and Klebsiella). Bacterial quality of drinking water and gram-negative bacteria resistant to chlorine in Baghdad's municipal water supply. Regarding pH, the w
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show More