Multiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain method for multiple eliminations. The method is tested on a fake reflection event to authorize their validity, and applied to a real field X-profile 2D seismic data from southern Iraq. The results ensure the possibility of internal multiple types existing in the deep reflection data in Iraq and have to remove. So that the interpretation for the true reflectors be valid. The final processed stacked seismic data using normal move out- frequency-wavenumber domain technique shows good, clear, and sharp reflectors in comparison with the conventional normal move out stack data. Open-source Madagascar reproducible package is used for processing all steps of this study and the package is very efficient, accurate, and easy to implement normal move out, frequency-wavenumber domain, Dip-filter programs. The aim of the current study is to separate internal multiples and noise from the real 2D seismic data.
In real situations all observations and measurements are not exact numbers but more or less non-exact, also called fuzzy. So, in this paper, we use approximate non-Bayesian computational methods to estimate inverse Weibull parameters and reliability function with fuzzy data. The maximum likelihood and moment estimations are obtained as non-Bayesian estimation. The maximum likelihood estimators have been derived numerically based on two iterative techniques namely “Newton-Raphson†and the “Expectation-Maximization†techniques. In addition, we provide compared numerically through Monte-Carlo simulation study to obtained estimates of the parameters and reliability function i
... Show MoreBased on collections made during March to September 2012. A totals of 58 species belong to 33 genera were identified from extra north to extra south of Erbil governorate, among them 30 species are registered as a new record to flora of Iraq. Most attention was paid to the most common and abundant lichens that present almost in most locations, which were Collema cristatum, Diploschistes scruposus, Lecanora dispersa, Lecanora murales, Pertusaria flavicunda, Placidium lacinulatum, Thelomma californicum and Verrucaria Maura.
Objective of the study was to rate and analyze the physical fitness of female students from Iraq and Russia to find similarities, differences and regularities. Sampled for the study were 44 female non-sporting students: 20 students from Pedagogical University in Bagdad; and 24 students from Russian State University of Physical Education, Sport, Youth and Tourism in Moscow. The study was designed to obtain the joints flexibility, coordination, speed-strength and static endurance rates. The Iraqi students were tested with higher coordination abilities than their Russian peers, whilst the latter were ranked higher in the speed-strength, shoulder joints and spine flexibility tests, albeit lower than their Iraqi peers in the hip flexibility test
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show MoreE-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreThe present research aims to know the relation of Violence on academic Failed and School s’ Drop - out among Intermediate stage Pupils. The sample of the research reached (400) male and female pupils (failed and not failed ), and (69) male and female that Drop – out from Intermediate stage. The researcher used scale of Violence that constructed by (AL- qaysi , 2004) after she got Validity and Reliability to it . So that she used t- test for one sample, t- test for two independent sample, and Person correlation coefficient as a statistical means. The research reached to the results that indicates raising of level of Violence among the Intermediate stage pupils (failed and not failed) and the male and female that Drop – out from Inte
... Show More