The majority of the environmental outputs from gas refineries are oily wastewater. This research reveals a novel combination of response surface methodology and artificial neural network to optimize and model oil content concentration in the oily wastewater. Response surface methodology based on central composite design shows a highly significant linear model with P value <0.0001 and determination coefficient R2 equal to 0.747, R adjusted was 0.706, and R predicted 0.643. In addition from analysis of variance flow highly effective parameters from other and optimization results verification revealed minimum oily content with 8.5 ± 0.7 ppm when initial oil content 991 ppm, temperature 46.4 °C, pressure 21 Mpa, and flowrate 27,000 m3/day which is nearly closed to suggested oily content 8.5 ppm. An artificial neural network (ANN) technique was employed in this study to estimate the oil content in the treatment process. An artificial neural network model was remarkably accurate at simulating the process under investigation. A low mean squared error (MSE) and relative error (RE) equal to 1.55 × 10−7 and 2.5, respectively, were obtained during the training phase, whilst the testing results demonstrated a high coefficient of determination (R2) equal to 0.99.
In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreExcessive torque and drag can be critical limitation during drilling highly deviated oil wells. Using the modeling is regarded as an invaluable process to assist in well planning and to predict and prevent drilling problems. Identify which problems lead to excessive torque and drag to prevent cost losses and equipment damage. Proper modeling data is highly important for knowing and prediction hole problems may occur due to torque and drag and select the best method to avoid these problems related to well bore and drill string. In this study, Torque and drag well plan program from landmark worldwide programming group (Halliburton Company) used to identify hole problems.one deviated well in Zubair oil fields named, ZB-250 selected for
... Show MoreExcessive torque and drag can be critical limitation during drilling highly deviated oil wells. Using the modeling is regarded as an invaluable process to assist in well planning and to predict and prevent drilling problems. Identify which problems lead to excessive torque and drag to prevent cost losses and equipment damage. Proper modeling data is highly important for knowing and prediction hole problems may occur due to torque and drag and select the best method to avoid these problems related to well bore and drill string. In this study, Torque and drag well plan program from landmark worldwide programming group (Halliburton Company) used to identify hole problems.one deviated well in Zubair oil fields named, ZB-250 selected for anal
... Show More
To identify the importance of the role of succession planning in developing human capital in organizations in light of the accelerating and dynamic events and changes in the work environment, and the research problem indicated the seriousness of employees retiring or leaving their positions for any reason and the extent of its impact on the organization in creating gaps in leadership and problems In managing the talent injection because there will be a shortage of talent, which in turn will affect the general performance of the business in the researched institute, so the importance of research appears in trying to present a set of solutions through which some of the problems facing the organization in quest
... Show MoreBackground: Pain due to muscular cramp during hemodialysis is one of the most common problems experienced by patient undergoing hemodialysis, and is associated with poor outcomes of patients. The main aim of this study was to comparing the effects of lavender oil and olive oil massage on Pain due to muscular cramp during hemodialysis.
Methods: In this random clinical trial, 60 hemodialysis patients were enrolled randomly and allocated to two groups with 30 members in Lordegan and Brojen hospitals, Shahrekord, Iran. The intervention included flora massage on the lower leg muscles so that the first group received olive oil massage (10 drops) and the second group received lavender oil massage (10 dr
... Show MoreBinary mixtures of three, heavy oil-stocks was subjected to density measurements at temperatures of 30, 35 and 40 °C. and precise data was acquired on the volumetric behavior of these systems. The results are reported in terms of equations for excess specific volumes of mixtures. The heavy oil-stocks used were of good varity, namely 40 stock, 60 stock, and 150 stock. The lightest one is 40 stock with °API gravity 33.69 while 60 stock is a middle type and 150 stock is a heavy one, with °API gravity 27.74 and 23.79 respectively. Temperatures in the range of 30-40 °C have a minor effect on excess volume of heavy oil-stock binary mixture thus, insignificant expansion or shrinkage is observed by increasing the temperature this effect beco
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreEnglish is spoken by its native speakers in two different forms. Reduced form which marks the colloquial and rapid speech so that it is easily produced and a citation or unreduced form which is a characteristic of careful, emphasized and slow speech.
This paper investigates Iraqi EFL university students’ production of the two forms mentioned above. The sample chosen includes twenty fourth year students, of which ten are males and the other ten are females from the Department of English of the College of Languages of the University of Duhok in Kurdistan Region of Iraq in the academic year 2020-2021. The material tested is six connective words which represent the commonest ones in every-day co
... Show More