Preferred Language
Articles
/
QRZLE4cBVTCNdQwCozRs
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation pore pressure, and in-situ stresses of the studied area were included as inputs. The second step was by optimizing the process using a genetic algorithm (GA), as a class of optimizing methods for complex functions, to obtain the maximum ROP along with the related wellbore trajectory (AZI and INC). Finally, the suggested azimuth (AZI) and inclination (INC) are premeditated by considering the results of wellbore stability analysis using wireline logging measurements, core and drilling data from the offset wells.

The results showed that the optimized wellbore trajectory based on wellbore stability analysis was compatible with the results of the genetic algorithm (GA) that used to reach higher ROP. The recommended orientation that leads to maximum ROP and maintains the stability of drilling deviated wells (i.e., inclination ranged between 40°—50°) is parallel to (140°—150°) direction. The present study emphasizes that the proposed methodology can be applied as a cost-effective tool to optimize the wellbore trajectory and to calculate approximately the drilling time for future highly deviated wells.

View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
measure the relationship between imported inflation and foreign trade in the Iraqi economy for long 1990-2015 using model nardl
...Show More Authors

The study aims to discuss the relation between imported inflation and international trade of Iraqi economy for the period (1990-2015) by using annual data. To achieve the study aim, statistical and Econometrics methods are used through NARDL model to explain non-linear relation because it’s a model assigned to measure non-linear relations and as we know most economic relations are non-linear, beside explaining positive and negative effects of imported inflation, and to reach the research aim deductive approach was adopted through using descriptive method to describe and determine phenomenon. Beside the inductive approach by g statistical and standard tools to get the standard model explains the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Robotics And Control (jrc)
Automated Stand-alone Surgical Safety Evaluation for Laparoscopic Cholecystectomy (LC) using Convolutional Neural Network and Constrained Local Models (CNN-CLM)
...Show More Authors

In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like iden

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Saudi Pharmaceutical Journal
Organization factors influencing nurse ability to prevent and detect adverse drug events in public hospitals using a patient safety model
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 23 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF SOME CHEMICAL AND PHYSICAL PROPERTIES USING A WATER TREATMENT UNIT VORTISAND COMPARED TO THEIR CONCENTRATION IN WATER PRODUCED BY TRIDINTINAL DRINKING WATER PROJECTS IN BAGHDAD.: ESTIMATION OF SOME CHEMICAL AND PHYSICAL PROPERTIES USING A WATER TREATMENT UNIT VORTISAND COMPARED TO THEIR CONCENTRATION IN WATER PRODUCED BY TRIDINTINAL DRINKING WATER PROJECTS IN BAGHDAD.
...Show More Authors

This study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU

... Show More
View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
The Impact of Putinism on the Russian-Ukrainian Conflict: an analysis of the contents of the speeches of Russian President Vladimir Putin on the causes of the Russian war on Ukraine in 2022
...Show More Authors

this research seeks to shed light on the study of the impact of Putinism on the Russian-Ukrainian war that broke out in early 2022, by studying the contents of the speeches of Russian President Vladimir Putin before the start of the war. This research uses the structural approach in analyzing the components of the Russian political regime. The research tools used in this research include case studies, content analysis of Russian speeches, and personal meetings of researchers and specialists in Russian affairs. It sums up a number of important conclusions, most notably are : 1) Putinism is a totalitarian regime that includes the political doctrine during the era of Russian President Vladimir Putin. 2) Duginism represents the totality of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
The Degree of Using Augmented Reality Technology among students of the Optimum Invesment Project fot Teaching Personnel Program and the difficulties they face at Al-Shaqra University
...Show More Authors

Augmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Extending the storage life of some fruits by using Pullulan produced from locally isolate Aureobasidium pullulans: Extending the storage life of some fruits by using Pullulan produced from locally isolate Aureobasidium pullulans
...Show More Authors

Six isolates of A. pullulans were collected from many sources including Hibiscus sabdariffa (Roselle), old Roofs of houses and bathroom surface that referred as Ap ros1, Ap or2, 3, 4 and Ap bs5, 6 respectively, all these isolates were identified based on morphological characteristics and nutritional physiology profiles, all were able to utilize various carbon and nitrogen sources such as glucose, xylose, sucrose, maltose, ammonium sulfate, ammonium nitrate and ammonium chloride, also they showed positive test for starch and amylase, while α-cellulose, ethanol, and methanol were could not be ass

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Image data compression by using multiwavelete for color image
...Show More Authors

There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja

View Publication Preview PDF