Wellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It also presents the optimal mud weight window for this field, which can be used to optimise the mud weights to minimise the wellbore instability issues. The results showed that an artificial neural network is a powerful tool for determining the breakout zones using the input data. The obtaining root mean square error and the determination coefficient were respectively 0.0082 and 0.959, by which the 1D MEM gave a high match between the predicted wellbore instabilities using the Mogi-failure criterion and the predicted breakout using the ANN model. Most borehole enlargements occur due to formation shear failures because of using low mud weights during drilling. The conclusion clarify the1.35 g/cc is the optimal mud weights for drilling new wells in this field of interest with fewer drilling issues.
Classification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traff
... Show MoreThis paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
The present article is devoted to the analysis of Arabic phraseological units with a component hand, selected by continuous sampling from the “Training Russian-Arabic phraseological dictionary: about 900 phraseological units” by G. L. Permyakov. Arabic phraseological units with a component hand are modeled as invariant situations (by logical-semiotic models) and figurative statements are expressed by phraseological variants (according to the figurative characteristic of the hand component). The artical focuses on the fact that somatism in Arabic phraseology has a symbolic and symbolic nature, marking various situations of Arabs' behavior, their actions, deeds, rituals, emotional and psychological states, etiquette, in
... Show MoreObjective: To evaluate the functional outcomes after extended curettage and reconstruction using a combination of bone graft and bone cement (sandwich). Methodology: In this prospective case series 16 skeletally mature patients with primary giant cell tumor around the knee were included. Patients with previous surgically treated, malignant transformation, degenerative knee changes and those presenting with pathological fracture were excluded. The tumor was excised with bone graft filling space beneath the articular cartilage and a block of gel foam was placed over the cortical surface of picked bone graft. Remaining cavity was filled with polymethylmethacrylate cement (sandwich) with or without internal fixation. The func tional evaluation
... Show MoreIn the last few years, fiber-coupled diode lasers have shown massive applications in many fields of communication and scientific research. Particularly, the pumping of solid-state lasers is a key application for more powerful diode lasers enabling good solutions in various laser micro methods like metal cutting, sintering, structuring as well as drilling. In this work, a simple beam shaping method is demonstrated for coupling a high-power semiconductor laser diode into multi-mode fiber optic using optical lenses. The optical lenses as beam transformation components are utilized to reshape the asymmetrical irradiation of the diode laser bar and to circularize the laser beam. Using this simple method, compact, high-output-power, and high-b
... Show MoreBackground: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.
Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for resi
... Show MoreThis study presents a practical method for solving fractional order delay variational problems. The fractional derivative is given in the Caputo sense. The suggested approach is based on the Laplace transform and the shifted Legendre polynomials by approximating the candidate function by the shifted Legendre series with unknown coefficients yet to be determined. The proposed method converts the fractional order delay variational problem into a set of (n + 1) algebraic equations, where the solution to the resultant equation provides us the unknown coefficients of the terminated series that have been utilized to approximate the solution to the considered variational problem. Illustrative examples are given to show that the recommended appro
... Show MoreIn this paper, suggested method as well as the conventional methods (probability
plot-(p.p.) for estimations of the two-parameters (shape and scale) of the Weibull
distribution had proposed and the estimators had been implemented for different
sample sizes small, medium, and large of size 20, 50, and 100 respectively by
simulation technique. The comparisons were carried out between different methods
and sample sizes. It was observed from the results that suggested method which
were performed for the first time (as far as we know), by using MSE indicator, the
comparisons between the studied and suggested methods can be summarized
through extremely asymptotic for indicator (MSE) results by generating random
error