In drilling fluid program, selecting the drilling fluid that will reduce the lost time is the first objective, and will be economical regardless of its cost. The amount and type of solids in drilling fluid is the primary control of the rheological and filtration properties. Palygorskite clay (attapulgite) is an active solid that has the ability to reactive with its environment and form a gel structure within a fluid and due to its stability in the presence of brines and electrolytes this type of clay is preferred for use. The aim of this study is to improve properties of Iraqi palygorskite (PAL) by adding different chemical additives such as caustic soda NaOH and soda ash Na2CO3 with a different concentration in both fresh and salt water-based drilling fluid to satisfy the API specification and to compete with imported palygorskite. The palygorskite claystone of Late Cretaceous age is present in the Western Desert of Iraq within the Digma Formation. In this study, two areas in Western Desert palygorskite were obtained, Bahr Al-Najaf and Trefawi. The results of rheological properties showed that the performance of Bahr Al-Najaf PAL was more affected by caustic soda than Trefawi PAL. In contrast, Trefawi PAL performance was more affected with low concentrations of soda ash than Bahr Al-Najaf PAL in both fresh and salt water-based drilling fluid. Also, these additives lead to improve the value of pH in both fresh and salt drilling fluid that increases the ability of clay to be more dispersed in drilling fluid. Besides that, enhancement of drilling fluid prepared with Iraqi palygorskite stability to 85 and 80 in fresh and saltwater, respectively, was observed with soda ash additions.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show MoreThis paper is focused on orthogonal function approximation technique FAT-based adaptive backstepping control of a geared DC motor coupled with a rotational mechanical component. It is assumed that all parameters of the actuator are unknown including the torque-current constant (i.e., unknown input coefficient) and hence a control system with three motor control modes is proposed: 1) motor torque control mode, 2) motor current control mode, and 3) motor voltage control mode. The proposed control algorithm is a powerful tool to control a dynamic system with an unknown input coefficient. Each uncertain parameter/term is represented by a linear combination of weighting and orthogonal basis function vectors. Chebyshev polynomial is used
... Show MoreIn this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.
Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreThis paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreOil pollution of the soil due to a leakage in oil tubes, transportation of products, or during oil excavations can change the soil physical and mechanical, chemical, and biological properties. Consequently, the soil may or may not be eligible for engineering construction projects and it may need a significant treatment. Therefore, it is required to have a better understanding of the general behavior and the corresponding geotechnical properties upon pollution particularly for those areas associated with oil explorations and industry like Thi-Qar Governorate. Fine and coarse soils from two sites at the University of Thi-Qar are artificially contaminated with oil products ranging from 0% to 10% of their dry weight. Testing programs have been
... Show More