It is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy inference system and genetic algorithm. An offset field data was collected from mud logging and wire line log from East Baghdad oil field south region to build the AI models, including datasets of two wells: well 1 for AI modeling and well 2 for validation of the obtained results. The types of interesting formations are sandstone and shale (Nahr Umr and Zubair formations). Nahr Umr and Zubair formations are medium –harder. The prediction results obtained from this study showed that the ANN technique can predict the ROP with high efficiency as well as FIS technique could achieve reliable results in predicting ROP, but GA technique has shown a lower efficiency in predicting ROP. The correlation coefficient and RMSE were two criteria utilized to evaluate and estimate the performance ability of AI techniques in predicting ROP and comparing the obtained results. In the Nahr Umr and Zubair formations, the obtained correlation coefficient values for training processes of ANN, FIS and GA were 0.94, 0.93, and 0.76 respectively. Data sets from another well (well 2) in the same field of interest were utilized to validate of the developed models. Datasets of well 2 were conducted against sandstone and shale formations (Nahr Umr and Zubair formations). The results revealed a good matching between the actual rate of penetration values and the predicted ROP values using two artificial intelligence techniques (neural network, and fuzzy inference technique). In contrast, the genetic algorithm model showed overestimation/ underestimation of the rate of penetration against sandstone and shale formations. This means that the optimum prediction of rate of penetration can be obtained from neural network model rather than using genetic algorithm and genetic algorithm techniques. The developed model can be successfully used to predict the rate of penetration and optimize the drilling parameters, achieving reduce the cost and time of future wells that will be drilled in the East Baghdad Iraqi oil field.
The study was conducted at the fields of the Department of Horticulture and Landscape Gardening,College of Agriculture, University of Baghdad during the growing seasons of 2013- 2014 .forPerformance of Evaluation Vegetative growth and yield traits and estimate some important geneticparameter on seven selected breed of tomato which (S1-S7 ) Pure line. the results found significantdifferences between breeds in all study trails except clusters flowering number .S1 significantly plantlength which reached 227.3 .Also S1,S2 and S4 were significantly increased the number fruit for plant,Fruit weight Increased in S3 ,S6 and plant yield. Increased in S1, S4 ,S5. Genetic variation valueswere low in Floral clusters , TSS and fruit firmest and medium i
... Show MoreResearch Summary
It highlights the importance of assessing the demand for money function in Iraq through the understanding of the relationship between him and affecting the variables by searching the stability of this function and the extent of their influence in the Iraqi dinar exchange rate in order to know the amount of their contribution to the monetary policies of the Iraqi economy fee, as well as through study behavior of the demand for money function in Iraq and analyze the determinants of the demand for money for the period 1991-2013 and the impact of these determinants in the demand for money in Iraq.
And that the problem that we face is how to estimate the total demand for money in
... Show MoreObjective: Assessment of health problems and identify demographical information to elderly. Methodology:
it is a descriptive study, data were collected by the researchers depended on the direct interview with the
elderly by using the study instrument (questionnaire) as well as review the records of the geriatric.
Results: The majority of study sample (66%) were males and (24.3%) were within age group (70-74) years,
(44.7%) were widows, and (41.7%) did not read and write. This study applied the international classification
of diseases(short-table) in (11) items, which stated that most of the elderly were complaining from
health problems: debility of hearing (80.65%), eczema or allergies (69.35%), debility of vision (66.9
This study was conducted to identify the health status of children's nurseries in the city of Baghdad and to identify improper dietary habits practiced by these children have shown the results of this study that the same proportion of childhood diarrhea disease research and infections
The main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.