Wellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It also presents the optimal mud weight window for this field, which can be used to optimise the mud weights to minimise the wellbore instability issues. The results showed that an artificial neural network is a powerful tool for determining the breakout zones using the input data. The obtaining root mean square error and the determination coefficient were respectively 0.0082 and 0.959, by which the 1D MEM gave a high match between the predicted wellbore instabilities using the Mogi-failure criterion and the predicted breakout using the ANN model. Most borehole enlargements occur due to formation shear failures because of using low mud weights during drilling. The conclusion clarify the1.35 g/cc is the optimal mud weights for drilling new wells in this field of interest with fewer drilling issues.
This study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show More“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical
... Show MorePower switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreAbstract:
The prose poem of the 1990s is considered one of the important
contributions of the Iraqi poetic scene. The poem found a position in the Iraqi
poetry because of the favor of a group of youth poets who lefty clear traces.
Their linguistic techniques often violate the domain o9f language, significance
and image.
The poems of those youth poets moved the verse towards reality to
drink from its abundant springs in order to stand on a rigid ground. Their
linguistic traces are characterized by paradox and astonishment that are used
by the poet to construct his poem.
The paradox was considered an ideal means for constructing a
poem by some of them. The poem moved towards definitions and these
de
The maintenance of the diesel engine parts in any electric power station contains many problems that lead to stopping. Several reasons lead to such problems; these reasons should be analyzed and evaluated in order to eliminate their effects. This paper is based on evaluation of the main causes that lead to diesel engine injector failure as a main part of electric power stations, using fault tree analysis (FTA). The FTA is the most broadly utilized strategies in the industrial area to perform reliability analysis of complex designing frameworks. A fault tree is a logical representation of the relationship of basic events that lead to a given unwanted event (i.e., top event).
Starting with introducing the FTA and how it could be uti
... Show MoreObjective(s): To determine the impact of health education program toward their end-stage renal failure (ESRF)
patients’ knowledge through a follow-up approach each two months post program implementation for six months.
Methodology: "Follow-up" longitudinal design by using time series approach of data analysis and the application of
pre-post tests approach for the study group and the control group. The study is conducted in Al-Shahid Ghazi Hariri
Teaching Hospital for Surgical Specialties/Centre for Disease and Renal Transplant, and Al-Khayal private Hospital for
renal disease and transplantation during the period from August, 29th
, 2010 through February, 28th
, 2011. To achieve
the objectives of the study, purp
The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show More