Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in Mishrif formation in Nasiriya oil field for the selected wells. The mean square error for the results obtained from the ANFIS model was 0.015. The model was trained and simulated using MATLAB and Simulink platform. Laboratory measurements were conducted on core samples selected from two wells. Ultrasonic device was used to measure the transit time of compressional and shear waves and to compare these results with log records. Ten wells in Nasiriya oil field had been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software and based on the las files and log records provided. The average rate of penetration of the studied wells was determined and listed against depth with the average dynamic elastic properties and fed into the fuzzy system. The average values of bulk modulus for the ten wells ranged between (20.57) and (27.57) . For shear modulus, the range was from (8.63) to (12.95) GPa. Also, the Poisson’s ratio values varied from (0.297) to (0.307). For the first group of wells (NS-1, NS-3, NS-4, NS-5, and NS-18), the ROP values were taken from the drilling reports and the lowest ROP was at the bottom of the formation with a value of (3.965) m/hrs while the highest ROP at the top of the formation with a value (4.073) m/hrs. The ROP values predicted by the ANFIS for this group were (3.181) m/hrs and (4.865) m/hrs for the lowest and highest values respectively. For the second group of wells (NS-9, NS-15, NS-16, NS-19, and NS-21), the highest ROP obtained from drilling reports was (4.032) m/hrs while the lowest value was (3.96) m/hrs. For the predicted values by ANFIS model were (2.35) m/hrs and (4.3) m/hrs for the lowest and highest ROP values respectively.
Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreThe internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. O
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreEight patients (3 male and 5 female) were treated in this study by Endovenous Laser Ablation (EVLA); Mathematical models are proposed to estimate the applied laser power and to assess the recovery period. The estimations of the applied laser power and recovery period in these models will be depended mainly on the diameter of the incompetent vein. In addition, Excel Program was utilized to find the proposed models. A 1470 nm diode laser up to 15W continuous power (CW) was used in the treatment of venous ulcers by EVLA procedure. Following up by duplex ultrasound was started in the 1st week after the first session until the vein is completely closed. The present study concluded that the relationship both between
... Show MoreIn order to reduce hydrostatic pressure in oil wells and produce oil from dead oil wells, laboratory rig was constructed, by injecting LPG through pipe containing mixture of two to one part of East Baghdad crude oil and water. The used pressure of injection was 2.0 bar, which results the hydrostatic pressure reduction around 246 to 222 mbar and flow rate of 34.5 liter/hr fluid (oil-water), at 220 cm injection depth. Effects of other operating parameters were also studied on the behavior of two phase flow and on the production of oil from dead oil wells.