Multiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain method for multiple eliminations. The method is tested on a fake reflection event to authorize their validity, and applied to a real field X-profile 2D seismic data from southern Iraq. The results ensure the possibility of internal multiple types existing in the deep reflection data in Iraq and have to remove. So that the interpretation for the true reflectors be valid. The final processed stacked seismic data using normal move out- frequency-wavenumber domain technique shows good, clear, and sharp reflectors in comparison with the conventional normal move out stack data. Open-source Madagascar reproducible package is used for processing all steps of this study and the package is very efficient, accurate, and easy to implement normal move out, frequency-wavenumber domain, Dip-filter programs. The aim of the current study is to separate internal multiples and noise from the real 2D seismic data.
In this study new derivatives of Schiff bases 5-8, 1, 3-oxazepine 9-16 and tetrazoles 17-19 have been synthesized from the new starting material 1 which has synthesized the reaction of one mole of dichloro acetic acid and two moles of thiophenol, the esters 2-3 were synthesized from the reaction of compound 1 with methanol or ethanol respectively in the presence of H2SO4 as catalyst then 2, 2-dithiophenylaceto Hydrazide 4 were synthesized from the reaction of 2 or 3 with hydrazine hydrate 80%, Schiff bases 5-8 were synthesized from the reaction of 4 with appropriate aldehyde or ketone. Treatment of Schiff bases with maleic and phathalic anhydride in dry benzene to give 1, 3-oxazepen derivatives 9-16 and with sodium azide in tetrahydrofuran
... Show MoreThe current study aimed to identify the difficulties faced by the student in mathematics and possible proposals to address these difficulties. The study used a descriptive method also used the questionnaire to collect data and information were applied to a sample of (163) male and female teachers. The results of the study found that the degree of difficulties in learning mathematics for the fifth and sixth grades is high for some paragraphs and intermediate for other paragraphs, included the student's field. The results also revealed that there were no statistically significant differences at the level of significance (α = 0.05) between the responses of the members of the study sample from male and female teachers to the degree of diffi
... Show Moreهدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التن
... Show MoreThe compound [L] was produced in the current study through the reaction of 4-aminoacetophenon with 4-methoxyaniline in the cold, concentrated HCl with 10% NaNO2. Curcumin, several transition metal complexes (Ni (II), La (III), and Hg (II)), and compound [L] were combined in EtOH to create new complexes. UV-vis spectroscopy, FTIR, AA, TGA-DSC, conductivity, chloride content, and elemental analysis (CHNS) were used to describe the structure of produced complexes. Biological activities against fungi, S. aureus (G+), Pseudomonas (G-), E. coli (G-), and Proteus (G-) were demonstrated using complexes. Depending on the outcomes of the aforementioned methods, octahedral formulas were given as the geometrical structures for each created comp
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More