Preferred Language
Articles
/
ijcpe-405
Application of Neural Network in the Identification of the Cumulative Production from AB unit in Main pays Reservoir of South Rumaila Oil Field.
...Show More Authors

A common field development task is the object of the present research by specifying the best location of new horizontal re-entry wells within AB unit of South Rumaila Oil Field. One of the key parameters in the success of a new well is the well location in the reservoir, especially when there are several wells are planned to be drilled from the existing wells. This paper demonstrates an application of neural network with reservoir simulation technique as decision tool. A fully trained predictive artificial feed forward neural network (FFNNW) with efficient selection of horizontal re-entry wells location in AB unit has been carried out with maintaining a reasonable accuracy. Sets of available input data were collected from the exploited grids and used in the training and testing of the used network. A comparison between the calculated and observed cumulative oil production has been carried out through the testing steps of the constructed ANN, an absolute average percentage error of the used network was reached to 4.044%, and this is consider to be an acceptable limit within engineering applications, in addition to that, a good behavior was reached with (FFNNW) and suitable re-entry wells location were identified according to the reservoir configuration (pressure and saturation distribution) output from SRF simulation model at the end of 2005.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Modified Weighted Pareto Distribution Type I (MWPDTI)
...Show More Authors

In this paper, the Azzallini’s method used to find a weighted distribution derived from the standard Pareto distribution of type I (SPDTI) by inserting the shape parameter (θ) resulting from the above method to cover the period (0, 1] which was neglected by the standard distribution. Thus, the proposed distribution is a modification to the Pareto distribution of the first type, where the probability of the random variable lies within the period  The properties of the modified weighted Pareto distribution of the type I (MWPDTI) as the probability density function ,cumulative distribution function, Reliability function , Moment and  the hazard function are found. The behaviour of probability density function for MWPDTI distrib

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 29 2023
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
Yolo Versions Architecture: Review
...Show More Authors

Deep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed.  A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing

... Show More
View Publication
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
استعمال انحدار الاسقاطات المتلاحقة و الشبكات العصبية في تجاوز مشكلة البعدية
...Show More Authors

المستخلص يهدف هذا البحث الى تجاوز مشكلة البعدية من خلال طرائق الانحدار اللامعلمي والتي تعمل على تقليل جذر متوسط الخطأ التربيعي (RMSE) , أذ تم  استعمال طريقة انحدار الاسقاطات المتلاحقة  (PPR)    ,والتي تعتبر احدى طرائق اختزال الابعاد التي تعمل على تجاوز مشكلة البعدية (curse of dimensionality) , وان طريقة (PPR) من التقنيات الاحصائية التي تهتم بأيجاد الاسقاطات الاكثر أهمية في البيانات المتعددة الابعاد , ومع ايجاد كل اسقاط

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Thu Mar 13 2025
Journal Name
Journal Of Lifestyle And Sdgs Review
Advancing SDG: Towards Effective Sustainability Reporting for Green Universities Via XBRL and Its Impact on Green Auditing Quality
...Show More Authors

Objective: This study aims to examine how implementing Extensible Business Reporting Language (XBRL) enhances the efficiency and quality of environmental audits and sustainability reporting in eco-friendly universities. Aligned with Sustainable Development Goal 12 (Responsible Consumption and Production), the study emphasizes promoting transparency and precision in sustainability reporting to encourage responsible management of resources within academic institutions.   Theoretical Framework: The importance of our study is evident in the importance of accurate and transparent reports in the development of environmental performance with theories of sustainable reporting and environmental auditing. One of the most important digital

... Show More
View Publication
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة
Proposed family speech recognition
...Show More Authors

Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.

Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Human recognition by utilizing voice recognition and visual recognition
...Show More Authors

Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some

... Show More
View Publication Preview PDF