Wellbore instability and sand production onset modeling are very affected by Sonic Shear Wave Time (SSW). In any field, SSW is not available for all wells due to the high cost of measuring. Many authors developed empirical correlations using information from selected worldwide fields for SSW prediction. Recently, researchers have used different Artificial Intelligence methods for estimating SSW. Three existing empirical correlations of Carroll, Freund, and Brocher are used to estimate SSW in this paper, while a fourth new empirical correlation is established. For comparing with the empirical correlation results, another study's Artificial Neural Network (ANN) was used. The same data that was adopted by the ANN study was used here where it is comprised of 1922 measured points of SSW and the other nine parameters of Gamma Ray, Compressional Sonic, Caliper, Neutron Log, Density Log, Deep Resistivity, Azimuth Angle, Inclination Angle, and True Vertical Depth from one Iraqi directional well. Three existing empirical correlations are based only on Compressional Sonic Wave Time (CSW) for predicting SSW. In the same way of developing previous correlations, a fourth empirical correlation was developed by using all measured data points of SSW and CSW. A comparison demonstrated that utilizing ANN was better for SSW predicting with a higher R2 equal to 0.966 and lower other statistical coefficients than utilizing four empirical correlations, where correlations of Carroll, Freund, Brocher, and developed fourth had R2 equal to 0.7826, 0.7636, 0.6764, and 0.8016, respectively, with other statistical parameters that show the new developed correlation best than the other three existing. The use of ANN or new developed correlation in future SSW calculations is relevant to decision makers due to a number of limitations and target SSW accuracy.
A study has been done to find the optimum separators pressures of separation stations. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid discharged from a higher pressure separator into the lower pressure separator. The set of working separators pressures which yield maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures which is the target of this work.
Computer model is used to find the optimum separators pressures. The model employs the Peng-Robinson equation of state for volatile oil. Application of this model shows good improvement of al
Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
In the field of construction project management, time and cost are the most important factors to be considered in planning every project, and their relationship is complex. The total cost for each project is the sum of the direct and indirect cost. Direct cost commonly represents labor, materials, equipment, etc.
Indirect cost generally represents overhead cost such as supervision, administration, consultants, and interests. Direct cost grows at an increasing rate as the project time is reduced from its original planned time. However, indirect cost continues for the life of the project and any reduction in project time means a reduction in indirect cost. Therefore, there is a trade-off between the time and cost for completing construc
AbstractThis study aimed to demonstrate the impact of human development on economic growth in Jordan during the period (1980-2014), Where some diagnoses tests were applied, the results of these tests concluded that the standard models used in the study were free of statistical problems, and hence ordinary least squares (OLS) standard has been used as a tool for analysis to get efficient and unbiased estimates to parameters according to the theory of Gauss Markov.
The results showed that there is a strong and positive impact of human development represented by the Human Development Index (HDI) on economic growth in Jordan represented by the average of real productivity of the Jordanian worker (
... Show MorePeriodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index,
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show Moreالخلاصة:
ة k تعتبر عملیة تشفیر البیانات الصوتیة من التكنولوجیا المألوفة لخزن ونقل الاشارات الصوتیة. العلامة المائی
ات k اق المعلوم k مح بالح k ذا تس k وتیة وھك k ارات الص k طة الاش k ة بواس k ات المنقول k تعطي القوة في عدم التحسس بوجود البیان
القیمة بالمحتوى مثل اسم المؤلف او الفنان او حقوق الطباعة المتعلقة بالبیانات.
ة k وع موج k ن ن k وتي م k ف ص k ي مل k ص ف k وع ن k ن ن k ة م k ة المائی k اء العلام k نة لاخف k ة محس k ث خوارز
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8