Preferred Language
Articles
/
ijcpe-894
Artificial Intelligent Models for Detection and Prediction of Lost Circulation Events: A Review
...Show More Authors

Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses is to prevent them. Drilling fluid loss is a complex problem that is difficult to predict using simple and traditional methods. Artificial intelligence represents a modern and accurate technology for solving complex problems such as drilling fluid loss. Artificial intelligence through supervised machine learning provides the possibility of predicting these losses before they occur based on field data such as drilling fluid properties, drilling parameters, rock properties, and geomechanical parameters that are related to the loss of circulation of the wells suffered from losses problem located in the same area.

   In this paper, several supervised machine learning models have been reviewed that were used for detecting and predicting of loss of drilling fluids during the drilling process. The paper provides an inclusive review of drilling fluid prediction and detection from simplest to more complected intelligent models.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Performance Evaluation of a PID and a Fuzzy PID Controllers Designed for Controlling a Simulated Quadcopter Rotational Dynamics Model
...Show More Authors

This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
3 Biotech
Detection of orthodontically induced inflammatory root resorption-associated biomarkers from the gingival crevicular fluid by proteomics analysis: a randomized-controlled clinical trial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 31 2025
Journal Name
Stallion Journal For Multidisciplinary Associated Research Studies
Article Review: Evaluation of the Biological Role and Gene Expression of CD144 in Colorectal Cancer
...Show More Authors

Colorectal cancer (CRC) remains a leading cause of cancer-related deaths worldwide, with tumor angiogenesis playing a pivotal role in its progression and metastasis. CD144 (VE-cadherin), a calcium-dependent adhesion molecule, is critical for endothelial cell integrity and has been linked to tumor angiogenesis and cancer stem cell phenotypes. This study aimed to evaluate the immunohistochemical expression of CD144 in benign colorectal lesions, normal adjacent tumor tissue (NRAT), and tumor tissues to elucidate its role in colorectal cancer progression. Multiple techniques, including immunohistochemistry, flow cytometry, Western blot, and qPCR, were used to assess CD144 expression and its association with the VEGF/VEGFR2 signaling pat

... Show More
View Publication
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Comparison between Open Mini-incision Thyroidectomy and Conventional Thyroidectomy: Clinical Experience and Literatures Review
...Show More Authors

Background: Thyroid surgery is most common endocrine surgery in general surgical practice. Objectives: the aim of this work is to evaluate the feasibility, benefits and outcomes of open mini-incision thyroidectomy and compared the results with that of conventional thyroidectomy. The comparison between the two groups was in term of incision length, amount of blood loss, time of operation, postoperative pain, hospital stay and the cosmetic outcomes.Type of the study: this is a single-blinded randomized controlled studyMethods: This study compared the advantages and outcomes of 22 patients subjected to mini-incision thyroidectomy (Group A) with the equal numbers of patients subjected to conventional thyroidectomy (Group B).Results: the oper

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 29 2021
Journal Name
Journal Of Engineering
Numerical Simulation of Water Distribution with Uptake Root in Drip Irrigation using Different Soil Hydraulic Models
...Show More Authors

Surface drip irrigation is one of the most conservative irrigation techniques that help control providing water directly on the soil through the emitters. It can supply fertilizer and providing water directly to plant roots by drippers. One of the essential needs for trickle irrigation nowadays is to obtain more knowledge about the moisture pattern under the trickling source for various types of soil with various discharge levels with trickle irrigation. Simulation numerical using HYDRUS-2D software, version 2.04 was used to estimate an equation for the wetted area from a single surface drip irrigation in unsaturated soil is taking into account water uptake by roots. In this paper, using two soil types were used, namely

... Show More
View Publication Preview PDF
Crossref