The drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the
Background: Multiple sclerosis (MS) is a chronic neurodegenerative autoimmune disease mediated by autoreactive T cells against myelin-basic proteins. Cytokines are suggested to play a role in the etiopathogenesis of the disease. Among these cytokines is interleukin-2 (IL-2). Aim of the study: To investigate the association between IL2+166 G/T single nucleotide polymorphism (SNP: rs2069763) and MS in Iraqi patients. Serum level of IL-2 was also detected. Anti-rubella IgG antibody was further determined in the sera of patients. Patients and methods: Eighty MS patients (28 males and 52 females; age mean ± SD: 39.2 ± 16.1 years) and 80 healthy control matched patients for age (32.15 ± 16.13 years) and gender (28 males and 52 females) were en
... Show MoreBackground: The genetic polymorphisms of vitamin D receptor (VDR) have an association with thalassemia development, additionally to the environmental elements that elicited the disorder in the genetically predisposed individuals. As well, VDR functions responsible for the regulation of bone metabolism, such its part in immunity. Aim: The sitting study intended to inspect the association between thalassemia disease and the genetic polymorphisms of VDR among the Iraqi population then compared these findings to other findings of thalassemia patients in other different ethnic populations. Materials and methods: The restriction enzymes Bsm-I and Fok-I were applied to determine the genetic polymorphisms frequencies of VDR by a Polymerase Chain Re
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThis paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord
... Show More