The time spent in drilling ahead is usually a significant portion of total well cost. Drilling is an expensive operation including the cost of equipment and material used during the penetration of rock plus crew efforts in order to finish the well without serious problems. Knowing the rate of penetration should help in speculation of the cost and lead to optimize drilling outgoings. Ten wells in the Nasiriya oil field have been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software based on the las files and log record provided. The average rate of penetration and average dynamic elastic properties for the studied wells was determined and listed with depth. Laboratory measurements were conducted on core samples selected from two wells from the studied wells. Ultrasonic device was used to measure the transit time of compressional and shear waves and to compare these results with log records. The reason behind that is to check the accuracy of the Greenberg-Castagna equation that was used to estimate the shear wave in order to calculate dynamic elastic properties. The model was built using Artificial Neural Network (ANN) to predict the rate of penetration in Mishrif formation in the Nasiriya oil field for the selected wells. The results obtained from the model were compared with the provided rate of penetration from the field and the Mean Square Error (MSE) of the model was 3.58 *10-5.
It is very difficult to obtain the value of a rock strength along the wellbore. The value of Rock strength utilizing to perform different analysis, for example, preventing failure of the wellbore, deciding a completion design and, control the production of sand. In this study, utilizing sonic log data from (Bu-50) and (BU-47) wells at Buzurgan oil field. Five formations have been studied (Mishrif, Sadia, Middle lower Kirkuk, Upper Kirkuk, and Jaddala) Firstly, calculated unconfined compressive strength (UCS) for each formation, using a sonic log method. Then, the derived confined compressive rock strengthens from (UCS) by entering the effect of bore and hydrostatic pressure for each formation. Evaluations th
... Show MoreThe evolution in the field of Artificial Intelligent (AI) with its training algorithms make AI very important in different aspect of the life. The prediction problem of behavior of dynamical control system is one of the most important issue that the AI can be employed to solve it. In this paper, a Convolutional Multi-Spike Neural Network (CMSNN) is proposed as smart system to predict the response of nonlinear dynamical systems. The proposed structure mixed the advantages of Convolutional Neural Network (CNN) with Multi -Spike Neural Network (MSNN) to generate the smart structure. The CMSNN has the capability of training weights based on a proposed training algorithm. The simulation results demonstrated that the proposed
... Show MoreZiegler and Nichols proposed the well-known Ziegler-Nichols method to tune the coefficients of PID controller. This tuning method is simple and gives fixed values for the coefficients which make PID controller have weak adaptabilities for the model parameters variation and changing in operating conditions. In order to achieve adaptive controller, the Neural Network (NN) self-tuning PID control is proposed in this paper which combines conventional PID controller and Neural Network learning capabilities. The proportional, integral and derivative (KP, KI, KD) gains are self tuned on-line by the NN output which is obtained due to the error value on the desired output of the system under control. The conventio
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreRecently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MoreIn this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.
... Show More
Some major pollutants of polycyclic aromatic hydrocarbons (PAH) those discharged as water produced (WP) from the AlAhdab oil field (AOF) in the ponds close to it may leak to the water resources around and eventually reaches the marshes which will affect its ecosystem. Thus, this work aims to track the availability of PAH in the water resources and the Main Outfall Drain (MOD) nearby. The determination of PAH was evaluated using “High-Performance Liquid Chromatography (HPLC)”. The mean concentration of sixteen PAH in the produced water within the field was relatively high (0.01 to 10.89 g/ml) with standard deviations of (0.10.9). While, PAH outside the field were gradually diminishes down to (0.01-0.039) x10-2 g/ml which exceeds th
... Show MoreThis paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show More