This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of ACO algorithm for the same problem with the same environmental conditions by providing the shortest path for multiple testing environments.
The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreThe purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The path and its nodal purposes
Abstract
This study has come to indicate the doctrinal purposes of faith in this path، It was composed of an introduction and four demands، as follows:
The first requirement: the intentions of distinguishing between the ranks of people according to divine justice، as those who pass by him are different. Some of them are safe by his work، surviving from the fire، and some of them are not peace، he falls into the fire of Hell، and all of them are different in their ranks in a manner consistent with the justice of God Almighty and the works they have given themselves.
The second requirement: the purposes of divine mercy in honoring the Prophet and his nation on the path and embodying their
Exploitation of mature oil fields around the world has forced researchers to develop new ways to optimize reservoir performance from such reservoirs. To achieve that, drilling horizontal wells is an effective method. The effectiveness of this kind of wells is to increase oil withdrawal. The objective of this study is to optimize the location, design, and completion of a new horizontal well as an oil producer to improve oil recovery in a real field located in Iraq. “A” is an oil and gas condensate field located in the Northeast of Iraq. From field production history, it is realized the difficulty to control gas and water production in this kind of complex carbonate reservoir with vertical producer wells. In this study, a horizont
... Show MoreProdigiosin is a ‘natural red pigment produced by Serratia marcescens which exhibits immunosuppressive and anticancer properties in addition to antimicrobial activities. This work presents an attempt to maximize the production of prodigiosin by two different strategies: one factor at time (OFAT) and statistical optimization. The result of OFAT revealed that sucrose and peptone were the best carbon and nitrogen sources for pigment production with concentration of prodigiosin of about 135 mg/ L. This value was increased to 331.6mg/ L with an optimized ratio of C/N (60:40) and reached 356.8 with pH 6 and 2% inoculum size at end of classical optimization. Statistical experimental design based on Response surface methodology was co
... Show MoreSubmerged arc welding (SAW) process is an essential metal joining processes in industry. The quality of weld is a very important working aspect for the manufacturing and construction industries, the challenges are made optimal process environment. Design of experimental using Taguchi method (L9 orthogonal array (OA)) considering three SAW parameter are (welding current, arc voltage and welding speed) and three levels (300-350-400 Amp. , 32-36-40 V and 26-28-30 cm/min). The study was done on SAW process parameters on the mechanical properties of steel type comply with (ASTM A516 grade 70). Signal to Noise ratio (S/N) was computed to calculate the optimal process parameters. Percentage contributions of each parameter are validated by using an
... Show More