Several correlations have been proposed for bubble point pressure, however, the correlations could not predict bubble point pressure accurately over the wide range of operating conditions. This study presents Artificial Neural Network (ANN) model for predicting the bubble point pressure especially for oil fields in Iraq. The most affecting parameters were used as the input layer to the network. Those were reservoir temperature, oil gravity, solution gas-oil ratio and gas relative density. The model was developed using 104 real data points collected from Iraqi reservoirs. The data was divided into two groups: the first was used to train the ANN model, and the second was used to test the model to evaluate their accuracy and trend stability. Trend test was performed to ensure that the developed model would follow the physical laws. Results show that the developed model outperforms the published correlations in term of absolute average percent relative error of 6.5%, and correlation coefficient of 96%.
Background:Non-host-adapted Salmonella serovar Typhimurium is a facultative intracellular bacterium, which invades and multiplies within mononuclear phagocytes in liver, spleen, lymph nodes and Peyer’s plaques. Salmonella infection is a crucial medical and veterinary problem globally. S. Typhimurium causes various clinical symptoms, from asymptomatic infection to typhoid-like syndromes in infants or highly susceptible animals, for instance mice.
Objective: The present study was carried out to investigate the efficacy of anthrax protective antigen (PA)as a potent adjuvant mixed with killed Salmonella Typhimurium (S.T.) to enhance the immunization capacity of the last.
Materials and Methods: Two groups of mice were immunized with e
The aim of this research is to benefit from recycl the aircraft waste oils which is discarded in sewage network, to be used in preparation of greases for industrial purposes and to reduce the environmental pollution. In this research synthetic greases were prepared with special specifications by mixing the waste oils after treating with (silica gel as adsorbent agent, and filtration to precipitate impurities then heated to 110 C? to get rid of water) bentonite produced in Iraq which is available and cheap with existence of high density polyethylene at specific conditions of ( heating and mixing) . The best weight proportion were reached, then paraffin wax and additives were added to improve the properties of grease and give the
... Show MoreThe regeneration of used oil is one of the essential processes for economical, industrial and environmental targets. Used oil is rich of hydrocarbons, metals (such as: aluminium, chromium, copper, iron, lead, manganese, nickel, silicon and tin), gasoline, water and antifreeze. Due to the high increasing rate of the number of cars, there is a huge quantity of used oil. In this study, different brands of used oil were involved in extraction and adsorption processes as a regeneration process of these used oils. The optimum conditions were determined such as solvents composition, solvent: oil ratio, KOH concentration and temperature. The solvent mixture of 40% of petroleum ether, 11% of 1-butanol and 4% of 2-propanol has shown the bes
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
With the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervise
... Show MoreAs a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put
... Show MoreA common field development task is the object of the present research by specifying the best location of new horizontal re-entry wells within AB unit of South Rumaila Oil Field. One of the key parameters in the success of a new well is the well location in the reservoir, especially when there are several wells are planned to be drilled from the existing wells. This paper demonstrates an application of neural network with reservoir simulation technique as decision tool. A fully trained predictive artificial feed forward neural network (FFNNW) with efficient selection of horizontal re-entry wells location in AB unit has been carried out with maintaining a reasonable accuracy. Sets of available input data were collected from the exploited g
... Show MoreThe aim of this paper is to design fast neural networks to approximate periodic functions, that is, design a fully connected networks contains links between all nodes in adjacent layers which can speed up the approximation times, reduce approximation failures, and increase possibility of obtaining the globally optimal approximation. We training suggested network by Levenberg-Marquardt training algorithm then speeding suggested networks by choosing most activation function (transfer function) which having a very fast convergence rate for reasonable size networks. In all algorithms, the gradient of the performance function (energy function) is used to determine how to
... Show More