In drilling processes, the rheological properties pointed to the nature of the run-off and the composition of the drilling mud. Drilling mud performance can be assessed for solving the problems of the hole cleaning, fluid management, and hydraulics controls. The rheology factors are typically termed through the following parameters: Yield Point (Yp) and Plastic Viscosity (μp). The relation of (YP/ μp) is used for measuring of levelling for flow. High YP/ μp percentages are responsible for well cuttings transportation through laminar flow. The adequate values of (YP/ μp) are between 0 to 1 for the rheological models which used in drilling. This is what appeared in most of the models that were used in this study. The pressure loss is a gathering of numerous issues for example rheology of mud), flow regime and the well geometry. An artificial neural network (ANN) that used in this effort is an accurate or computational model stimulated by using JMP software. The aim of this study is to find out the effect of rheological models on the hydraulic system and to use the artificial neural network to simulate the parameters that were used as emotional parameters and then find an equation containing the parameters μp, Yp and P Yp/ μp to calculate the pressure losses in a hydraulic system. Data for 7 intermediate casing wells with 12.25" hole size and 95/8" intermediate casing size are taken from the southern Iraq field used for the above purpose. Then compare the result with common equations used to calculate pressure losses in a hydraulic system. Also, we calculate the optimum flow by the maximum impact force method and then offset in Equation obtained by (Joint Marketing Program) JMP software. Finally, the equation that was found to calculate pressure losses instead of using common hydraulic equations with long calculations gave very close results with less calculation.
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show More<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show Moreتم التطرق في هذا البحث الى دور الذكاء الاصطناعي والتكنولوجيا الحديثة في العملية التدريبية بما يخدم أهدافه والاستفادة منه من خلال المخرجات الجيدة، حيث ان توظيف التكنولوجيا في تدريب رياضة المبارزة يسهل العملية التدريبية على المدرب واللاعب ويساهم في تقليل الجهد المبذول والوقت المستغرق ، وهدفت الدراسة الى التعرف على تأثير الجهاز المصنع في ضبط المسافة بين القدمين لدى عينة البحث ،استخدم المنهج التجريبي بت
... Show MoreLet A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
A 2D geological model for Mauddud Formation in the Badra oil field is built using Rockworks 16 software. Mauddud Formation produces oil from limestone units; it represents the main reservoir in the Badra oil field. Six wells (BD-1, BD-2, BD-4, BD-5, P-15, and P-19) are selected to build facies and petrophysical (Porosity and Water saturation) models. Wells data are taken from the core and cutting samples and studied through the microscopic. The petrophysical data (effective porosity and water saturation) are derived from computer processes interpretation results that are calculated by using Interactive Petrophysics software. The 2D models are built to illustrate the vertical and horizontal distribution of petrophysical properties between we
... Show MoreThe current study was conducted in Baghdad governorate (Karkh and Al-Rasafa regions) which included collecting 50 samples of freshly slaughtered sheep meat randomly collected from local slaughter areas and approved governmental slaughterhouses (25 liver and 25 ulna muscles). The results of the aflatoxin B1 detection showed that all samples were contaminated with this toxin at different concentrations ranging from 25–422 ppb and 65–492 ppb for each ulna muscles and liver, respectively. The histopathological and immunological study was conducted in meat samples containing higher and lower concentrations of the toxin. The results of the pathological study in the liver revealed that the concentration (492 ppb) caused thickening of t
... Show More