Shear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity from petrophysical parameters and any pair of compressional wave velocity, porosity and density in carbonate rocks. The established method can estimate shear wave velocity in carbonate rocks with a correlation coefficient of close to unity.
The present work elucidates the utilization of activated carbon (AC) and activated carbon loaded with silver nanoparticles (AgNPs-AC) to remove tetracycline (TC) from synthetically polluted water. The activated carbon was prepared from tea residue and loaded with silver nanoparticles. Scanning electron microscopy (SEM), X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), and Brunauer-Emmett-Teller (BET) were used to characterize the activated carbon (AC) and silver nanoparticles-loaded activated carbon (AgNPs-AC). The impact of various parameters on the adsorption effectiveness of TC was examined. These variables were the initial adsorbate concentration (Co), solution acidity (pH), adsorption time (t), and dosag
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreIn this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.
Today, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreBackground Type two diabetes (T2DM) is characterized by insufficient insulin production and secretion. Additionally, the body develops insulin resistance which affects 90–95% of diabetics. Complex cytokines, receptors, genetic pathways, and the immune system are involved in T2DM. Interleukin-18 (IL-18) is one of the inflammatory cytokines associated with Type 2 diabetes. Environmental and genetic variables, including genetic polymorphisms, can increase T2DM risk and its consequences. Single nucleotide gene polymorphisms (SNPs) are important risk factors for diabetes that can be used to find the disease early and treat it better. Objective This study aimed to determine the levels of IL-18 in the serum of Iraqi patients with Type 2 diabetes
... Show MoreSome major pollutants of polycyclic aromatic hydrocarbons (PAH) those discharged as water produced (WP) from the AlAhdab oil field (AOF) in the ponds close to it may leak to the water resources around and eventually reaches the marshes which will affect its ecosystem. Thus, this work aims to track the availability of PAH in the water resources and the Main Outfall Drain (MOD) nearby. The determination of PAH was evaluated using “High-Performance Liquid Chromatography (HPLC)”. The mean concentration of sixteen PAH in the produced water within the field was relatively high (0.01 to 10.89 g/ml) with standard deviations of (0.10.9). While, PAH outside the field were gradually diminishes down to (0.01-0.039) x10-2 g/ml which exceeds th
... Show MoreThe duration of the contract is a legal term first provided for in French Amendment Decree No. 131/2016, and given the increasing importance of time in contracts, we have chosen to study the legal rules governing time at the formative stage by drawing on changes in French law compared to both Iraqi and Egyptian laws. Article 1102 of French Amendment Decree No. 131/2016 stipulates that: "Everyone is free to contract or not to contract, to choose the person with whom he contracts, and to determine the content and form of the contract within the limits established by law." Contractual freedom does not permit a breach of the rules relating to public order), as well as article 1104, which provides for (contracts must be nego
... Show More