This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
Recently, environmental noise has arisen from various sources, such as those from exhaust mufflers of combustion engines found in cars, trucks, or power generators, which produce significant noise during their operation. Controlling the radiated noise from these mufflers is a major factor in improving acoustic comfort and minimizing the impact on the surrounding communities. Numerous research has been presented for this reason by modification of the internal structure of the exhaust muffler. The main objective of this work is to reduce the noise level emitted from exhaust mufflers. This can be achieved by adjusting structure parameters to attenuate the surrounding environment's radiated noise. Analysis of pressure-wave propagation h
... Show MoreThe present work included study of the effects of weather conditions such as solar radiation and ambient temperature on solar panels (monocrystalline 30 Watts) via proposed mathematical model, MATLAB_Simulation was used by scripts file to create a special code to solve the mathematical model , The latter is single –diode model (Five parameter) ,Where the effect of ambient temperature and solar radiation on the output of the solar panel was studied, the Newton Raphson method was used to find the output current of the solar panel and plot P-V ,I-V curves, the performance of the PV was determined at Standard Test Condition (STC) (1000W/m2)and a comparison between theoretical and experimental results were done .The best efficiency
... Show MoreDifferent additives are used in drilling fluids when the demanded properties cannot be gotten with clays. Drilling muds needs several additives and materials to give good characteristics. There are local alternatives more suitable for enhancing the rheology and filtration of drilling fluids. An experimental work had been conducted to assess the suitability of using potato starch to enhance rheological properties and filtration in drilling mud. This study investigated the potato starch as a viscosifier and fluid losses agent in drilling fluid. Results from this study proved that rheological properties of potato starch mud increased when pH of drilling fluid is increased. Potato starch could be used to enhance gel strength at low pH
... Show MoreDifferent additives are used in drilling fluids when the demanded properties cannot be gotten with clays. Drilling muds needs several additives and materials to give good characteristics. There are local alternatives more suitable for enhancing the rheology and filtration of drilling fluids. An experimental work had been conducted to assess the suitability of using potato starch to enhance rheological properties and filtration in drilling mud. This study investigated the potato starch as a viscosifier and fluid losses agent in drilling fluid. Results from this study proved that rheological properties of potato starch mud increased when pH of drilling fluid is increased. Potato starch could be used to enhance gel strength at low pH
... Show MoreIn this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the
... Show Moreداء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إد
... Show MoreThe simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More