A common field development task is the object of the present research by specifying the best location of new horizontal re-entry wells within AB unit of South Rumaila Oil Field. One of the key parameters in the success of a new well is the well location in the reservoir, especially when there are several wells are planned to be drilled from the existing wells. This paper demonstrates an application of neural network with reservoir simulation technique as decision tool. A fully trained predictive artificial feed forward neural network (FFNNW) with efficient selection of horizontal re-entry wells location in AB unit has been carried out with maintaining a reasonable accuracy. Sets of available input data were collected from the exploited grids and used in the training and testing of the used network. A comparison between the calculated and observed cumulative oil production has been carried out through the testing steps of the constructed ANN, an absolute average percentage error of the used network was reached to 4.044%, and this is consider to be an acceptable limit within engineering applications, in addition to that, a good behavior was reached with (FFNNW) and suitable re-entry wells location were identified according to the reservoir configuration (pressure and saturation distribution) output from SRF simulation model at the end of 2005.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show MoreWater flooding is one of the most important methods used in enhanced production; it was a pioneer method in use, but the development of technology within the oil industry, takes this subject toward another form in the oil production and application in oil fields with all types of oils and oil reservoirs. Now days most of the injection wells directed from the vertical to re-entry of full horizontal wells in order to get full of horizontal wells advantages.
This paper describes the potential benefits for using of re-entry horizontal injection wells as well as combination of re –entry horizontal injection and production wells. Al Qurainat productive sector was selected for study, which is one of the four main productive sectors of Sout
In recent decades, breeding deer populations in Iraq have expanded significantly in size and distribution. Owing to their role in pathogen transmission, these deer populations pose a risk to the livestock industry. However, little is known about the parasitic infection status of the breeding deer and the surrounding environment in Iraq. Atotal of 150 deer faecal samples were collected from male and female deer of various ages from four regions of Iraq and examined microscopically for intestinal parasites. Microscopic analysis revealed the presence of seven intestinal parasite species: Entamoeba spp. (48%), Giardia duodenalis (17%), Toxocara spp. (12%), Balantidium coli(9%), Taenia spp. (9%), Strongyloides spp. (3%) and Trichostrongy
... Show MorePetrophysical properties evaluation from well log analysis has always been crucial for the identification and assessment of hydrocarbon bearing zones. East Baghdad field is located 10 km east of Baghdad city, where the southern area includes the two southern portions of the field, Khasib formation is the main reservoir of East Baghdad oil field.
In this paper, well log data of nine wells have been environmentally corrected, where the corrected data used to determine lithology, shale volume, porosity, and water saturation. Lithology identified by two methods; neutron-density and M-N matrix plots, while the shale volume estimated by single shale indicator and dual shale indicator, The porosity is calculated from the three common po
... Show More