A common field development task is the object of the present research by specifying the best location of new horizontal re-entry wells within AB unit of South Rumaila Oil Field. One of the key parameters in the success of a new well is the well location in the reservoir, especially when there are several wells are planned to be drilled from the existing wells. This paper demonstrates an application of neural network with reservoir simulation technique as decision tool. A fully trained predictive artificial feed forward neural network (FFNNW) with efficient selection of horizontal re-entry wells location in AB unit has been carried out with maintaining a reasonable accuracy. Sets of available input data were collected from the exploited grids and used in the training and testing of the used network. A comparison between the calculated and observed cumulative oil production has been carried out through the testing steps of the constructed ANN, an absolute average percentage error of the used network was reached to 4.044%, and this is consider to be an acceptable limit within engineering applications, in addition to that, a good behavior was reached with (FFNNW) and suitable re-entry wells location were identified according to the reservoir configuration (pressure and saturation distribution) output from SRF simulation model at the end of 2005.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Football has progressed from being a ritual and a celebration to become an amateur sport, a professional sport, and now, increasingly, a commercial sport. In the analysis of football business model, the systemic approach should be adopted. If sport is regarded as one of the business sectors, then the application of business system methodology can be fully justified. The interest to create strong football business system calls for the search of the ways of popularizing football business model and boosting the economic potential of its participants. In the research literature tend to ignore the business processes within the sports business. Besides, the systemic approach in football business is usually limited to p
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreWater flooding is one of the most important methods used in enhanced production; it was a pioneer method in use, but the development of technology within the oil industry, takes this subject toward another form in the oil production and application in oil fields with all types of oils and oil reservoirs. Now days most of the injection wells directed from the vertical to re-entry of full horizontal wells in order to get full of horizontal wells advantages.
This paper describes the potential benefits for using of re-entry horizontal injection wells as well as combination of re –entry horizontal injection and production wells. Al Qurainat productive sector was selected for study, which is one of the four main productive sectors of Sout
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show MoreIn this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.