This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
As a result of rapid industrialization and population development, toxic chemicals have been introduced into water systems in recent decades. Because of its excellent efficiency and simple design, the three-dimensional (3D) electro-Fenton method has been used for the treatment of wastewater. The goal of the current study is to explore the efficiency of phenol removal by the 3D electro-Fenton process, which is one of the advanced oxidation processes (AOPs). In the present work, the effect of the addition of granular activated carbon (GAC) particles to the electro-Fenton system as the third electrode would be investigated in the presence of graphite as the anode and nickel foam as the cathode, which is the source of electro-generated hydrogen
... Show MoreThe study aims to examine the classroom activities of the developed English course (Flying High) for the high school first-grade students, identify creative thinking skills appropriate for this grade, and show the extent the classroom activities involve these skills from the female- teachers ‘point of view. The study adopted the descriptive survey method. The study community consists of all (50) English female-teachers who teach high school first grade in Arar city during the academic year (1440 -1441 A.H, the first semester). The study was applied to all respondents. The researcher used a questionnaire as a study tool. The study revealed that the female-teachers reported their disagreement and refusal of the classroom activities in th
... Show MoreBackground. The use of modern aids and technology has contributed greatly to football development, the goalkeeper is the most important position in the team, and the use of devices gave objective readings about the goalkeeper's ability in terms of skill and physical aspects. Objectives. The research aimed to prepare exercises using an electronic device to measure the knee bending angle because of its great importance in developing the skill of catching and dimensions of the high ball for football goalkeepers. Methods. The researchers used the experimental method, and the sample consisted of (4) male goalkeepers under 15 years of age, one of the research procedures was to determine the biomechanical variables affecting the development of the
... Show MoreIn this work, an optical fiber biomedical sensor for detecting the ratio of the hemoglobin in the blood is presented. A surface plasmon resonance (SPR)-based coreless optical fiber was developed and implemented using single- and multi-mode optical fibers. The sensor is also utilized to evaluate refractive indices and concentrations of hemoglobin in blood samples, with 40 nm thickness of (20 nm Au and 20 nm Ag) to increase the sensitivity. It is found in practice that when the sensitive refractive index increases, the resonant wavelength increases due to the decrease in energy.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show More