Preferred Language
Articles
/
bIZro4YBIXToZYALj5tT
Modeling Rate of Penetration using Artificial Intelligent System and Multiple Regression Analysis
...Show More Authors
Abstract<p>Over the years, the prediction of penetration rate (ROP) has played a key rule for drilling engineers due it is effect on the optimization of various parameters that related to substantial cost saving. Many researchers have continually worked to optimize penetration rate. A major issue with most published studies is that there is no simple model currently available to guarantee the ROP prediction.</p><p>The main objective of this study is to further improve ROP prediction using two predictive methods, multiple regression analysis (MRA) and artificial neural networks (ANNs). A field case in SE Iraq was conducted to predict the ROP from a large number of parameters. A databases from one well drilled in carbonate environments were subjected to the predictive methods. Each raw dataset is described by eight parameters including rate of penetration (ROP), true vertical depth (TVD), weight on bit (WOB), bit rotational speed (RPM), torque (TQ), flow rate (Q), equivalent circulating density (ECD), standpipe pressure (SPP), and unconfined compressive strength (UCS). First, both MRA and ANNs are tested as predictive methods. The prediction capacity of each model was also verified by using two-based error metrics: the determination coefficient (R2) and the mean square error (MSE).</p><p>The current results support the evidence that MRA and ANNs are able to be effectively utilize the drilling data, and thus provide accurate ROP prediction. However, more attention to the multiple regression analysis is required where it is implemented for ROP prediction. ANNs appear to be more conservative in predicting ROP than MRA as indicated by a higher value R2 (0.96) and lower value MSE (1.89) of the ANN model. Considering the input parameters, the obtained results showed that TVD, WOB, RPM, SPP, and ECD had the greatest effect on estimated ROP-conditions, followed in decreasing by pump flow rate, drilling torque, and rock strength. Another important point that highlights in this study is that the drilling rate may increase with depth in carbonate rocks because of their heterogeneity. This study presents new models to estimate ROP from other parameters which can help the driller to achieve an optimal drilling rate through monitoring controllable parameters.</p>
Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 05 2025
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence to Enhance Family Cohesion and Promote Positive Social Values
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Nov 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Gutta-Percha Penetration Depth into Simulated Lateral Canals by Using Three Different Obturation Techniques (A Comparative Study)
...Show More Authors

Background:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Modeling and Simulation of Solar Module performance using Five Parameters Model by using Matlab in Baghdad City
...Show More Authors

This work presents the modeling of the electrical response of monocrystalline photovoltaic module by using five parameters model based on manufacture data-sheet of a solar module that measured in stander test conditions (STC) at radiation 1000W/m² and cell temperature 25 . The model takes into account the series and parallel (shunt) resistance of the module. This paper considers the details of Matlab modeling of the solar module by a developed Simulink model using the basic equations, the first approach was to estimate the parameters: photocurrent Iph, saturation current Is, shunt resistance Rsh, series resistance Rs, ideality factor A at stander test condition (STC) by an ite

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Electric Power Systems Research
Electromagnetic transient modeling of form-wound stator coils with stress grading system under PWM excitation
...Show More Authors

The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the

... Show More
Crossref (5)
Crossref
Publication Date
Tue Dec 13 2022
Journal Name
International Information And Engineering Technology Association
Countermeasure of Riverbanks Local Scour and Deposition Using Different Shapes of Multiple Groynes with Different Spacing
...Show More Authors

In current study a computation fluid dynamic (CFD) technique was used to investigate the effect of groynes shape and spacing on the scour pattern and the maximum scour depth in open channel flow. CFD model have been validated throughout comparing the numerical results with three previous experimental studies for a single groyne located in open channel with three different shapes (L, quadrant, and parabola shapes). The comparison revealed very good agreement between numerical results of the maximum scour depth with the results of all experimental models. Moreover, investigations of the effect of multi-groynes (three groynes and four groynes) arranged in parallel with constant spacing and also with variable spacing have been done, the

... Show More
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays From Reaction Using a2-ratio Method
...Show More Authors

The -multiple mixing ratios of γ-transitions from levels of populated in the are calculated in the present work by using the a2-ratio methods. We used the experimental coefficient (a2) for two γ-transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions. This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa. The weight average of the -values calcu

... Show More
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Biofilm formation rate measurement in water and biomedical systems using photometric smartphones applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (2)
Crossref