Wellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It also presents the optimal mud weight window for this field, which can be used to optimise the mud weights to minimise the wellbore instability issues. The results showed that an artificial neural network is a powerful tool for determining the breakout zones using the input data. The obtaining root mean square error and the determination coefficient were respectively 0.0082 and 0.959, by which the 1D MEM gave a high match between the predicted wellbore instabilities using the Mogi-failure criterion and the predicted breakout using the ANN model. Most borehole enlargements occur due to formation shear failures because of using low mud weights during drilling. The conclusion clarify the1.35 g/cc is the optimal mud weights for drilling new wells in this field of interest with fewer drilling issues.
Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreMany neuroscience applications, including understanding the evolution of the brain, rely on neural cell instance segmentation, which seeks to integrate the identification and segmentation of neuronal cells in microscopic imagery. However, the task is complicated by cell adhesion, deformation, vague cell outlines, low-contrast cell protrusion structures, and background imperfections. On the other hand, existing segmentation approaches frequently produce inaccurate findings. As a result, an effective strategy for using the residual network with attention to segment cells is suggested in this paper. The segmentation mask of neural cells may be accurately predicted. This method is built on U-net, with EfficientNet serving as the e
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreSewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated. For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreAbstract:
The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year . The research examines the use of
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show More