Preferred Language
Articles
/
eRaTGIcBVTCNdQwCZzZc
Drill Bit Selection Optimization Based on Rate of Penetration: Application of Artificial Neural Networks and Genetic Algorithms
...Show More Authors
Abstract<p>The drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the modeling part, a one-dimension mechanical earth model (1D MEM) parameters, drilling fluid properties, and rig- and bit-related parameters, were included as inputs. The optimizing process was then performed to propose the optimum drilling parameters to select the drilling bit that provides the maximum possible ROP. To achieve this, the corresponding mathematical function of the ANNs model was implemented in a procedure using the genetic algorithm (GA) to obtain operating parameters that lead to maximum ROP. The output will propose an optimal bit selection that provides the maximum ROP along with the best drilling parameters. The statistical analysis of the predicted bit types and optimum drilling parameters comparing the actual flied measured values showed a low root mean square error (RMSE), low average absolute percentage error (AAPE), and high correction coefficient (R2). The proposed methodology provides drilling engineers with more choices to determine the best-case scenario for planning and/or drilling future wells. Meanwhile, the newly developed model can be used in optimizing the drilling parameters, maximizing ROP, estimating the drilling time, and eventually reducing the total field development expenses.</p>
Crossref
View Publication
Publication Date
Wed May 18 2016
Journal Name
Al-academy
The Application of Experimentation in the Iraqi theatre shows "Othello in the Kitchen" As a model: عادل كريم سالم
...Show More Authors

The researcher tackles the most outstanding conditions of experimentation, the importance of the study lies in being helpful to the workers in the field of theatre in general and directors in particular which the conditions of experimentation that should be taken.The study aims at knowing the experimental basis which the director (Sami Abdulhamid) followed in the realization of this.The researcher tackles in the First inquiry the concept of experimentation and the second tackles the conditions of experimentation.In the methodology of study the researcher analyzed the show of the "Othello in the Kitchen" and comes up to the following: 1. the dhows has cone with the nature of the previous shows experienced the methods that were not familia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Throughput Accounting in Maximizing Profits: Application Search in the General Company for Textile Industry / Cotton Factory
...Show More Authors

        Throughput accounting is concerned with a throughput measurement process to determine the efficiency of the company, to know the problems and obstacles it suffers from, to determine their causes and ways to address them.The research problem is represented by the following question: does the application of a throughput accounting lead to maximizing the company's profits? The aim of the research is to demonstrate the importance of throughput accounting, which is one of the tools of management accounting in providing an efficient information system that provides the company’s management with the information it needs to improve its production processes, increase a throughput, and thus maxi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 09 2025
Journal Name
Oxidation Communications
SYNTHESIS AND SPECTRAL CHARACTERISATION, MOLECULAR DOCKING, AND ANTIOXIDANT ACTIVITIES OF NOVEL METAL COMPLEXES AND THEIR NANOCOMPLEXES DERIVED FROM AN ISATIN-BASED SCHIFF BASE
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Sep 08 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Obstacles facing the application of electronic banking An exploratory: study of the opinions of a sample of bank employees operating in the city of Nasiriyah
...Show More Authors

Electronic banking plays a prominent role in providing the best banking services and upgrading the banking sector for the better, so this study aimed to shed light on the most prominent obstacles that prevent the application of electronic banking in banks operating in the city of Nasiriyah, and in order to achieve this goal the researcher used the descriptive analytical approach And through a questionnaire form that was distributed to a group of employees, numbering (60) employees in the upper, middle and operational departments in a number of branches of private banks operating in the city of Nasiriyah, namely (the Iraqi Trade Bank, the Gulf Commercial Bank, the Bank of Baghdad, the Union Bank of Iraq), which represented The stu

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis and identification of some new N-substituted quinazoline-4-one, thiazine-4-one and tetrazoline rings incorporating N-ethyl-2-(benzylthio)benzimidazole acetate and study their application as anti-oxidant agent
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A comparison between Bayesian Method and Full Maximum Likelihood to estimate Poisson regression model hierarchy and its application to the maternal deaths in Baghdad
...Show More Authors

Abstract:

 This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.

The comparison was done by  simulation  using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the  Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood  with sample size  (n = 30) is the best to represent the maternal mortality data after it has been reliance value param

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 18 2021
Journal Name
Egyptian Journal Of Chemistry
Coumarin based-histone deactylace HADC inhibitors
...Show More Authors

Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity

View Publication
Scopus (3)
Scopus
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref