In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis study introduced the effect of using magnetic abrasive finishing method (MAF) for finishing flat surfaces. The results of experiment allow considering the MAF method as a perspective for finishing flat surfaces, forming optimum physical mechanical properties of surfaces layer, removing the defective layers and decreasing the height of micro irregularities. Study the characteristics which permit judgment parameters of surface quality after MAF method then comparative with grinding
Reliability is an essential measure and important component of all power system planning and operation procedures. It is one of the key design factors when designing complex, critical and expensive systems. This paper presents a fuzzy logic approach for reliability improvement planning purposes. Evaluating the reliability of the complex and large planned Iraqi super grid ;as Al- Khairat generating station with its tie set is intended to be compact to that grid; and determination of the given reliability improvement project are the major goals of the paper. Results show that the Iraqi super grid reliability is improved by 9.64%. In the proposed technique, fuzzy set theory is used to include imprecise indices of different components in normal
... Show MoreWhat has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).
Background: Congenital club foot is a complex deformity of foot .It is a collection of different abnormalities, with different etiologies. Consequently, Severity varies with difficulties in evaluating treatment strategies with outcome results. The treatment of congenital club foot remains controversial. Usually, the orthopedist's goal is to obtain anatomically and functionally normal feet in all patients. Objective: To asses short term follow up result of conservatively treated club feet in relation to the age
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LT
... Show More