This article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and stacking, and the second stage is muting. Many Common Depth Point gathers are tested to select the proper muting dimension, later on; the auto pick for the muted semblance is done for the whole 2D seismic data. The following step is to stack the Normal Move Out corrected data. Differences are calculated between the two stages of the process which greatly help to determine the eliminated multiple locations within the sedimentary secession. This will reduce the risk of interpreting these sequences as primary reflectors spatially within deep thin layers. Madagascar open source package is used in these processing steps. Madagascar open source package is very efficient, accurate, and easy to correct any part of the Python code used in the two stages of processing.
Yersinia enterocolitica has ranked a third among the pathogens that most frequently cause gastrointestinal disorders transmitted to humans through food materials, especially contaminated meats. The meat infected with Yersinia enterocolitica had no change in apparent texture or smell. The aim of this research is to survey the frequency of Y. enterocolitica in ovine meat, compare their ratio of infection between the season, To carry out this study (125) samples of local ovine meat were collected by random sampling from the middle region of Iraq. The samples were divided into two groups steak and mince, then many microbiological tests (culture, & staining, biochemical Tests Api 20E, Vitik 2 and species-specific PCR amplicon for 16S RNA gene) w
... Show MoreThis study was designed for isolation and molecular identification of Nontuberculous Mycobacterium (NTM) from fish during the period between October and December 2017 from Karbla province, Iraq. This study included 200 fresh fish samples from four different species including Spondyliosoma cantharus, Liza abu, Carassius carassius and Cyprinuscarpio. Three samples of each fish were taken including gills, muscles and all internal organs. The samples were processed by decontamination, concentration of 4% sodium hydroxide, and 0.1 ml of sediment was streaking on Löwenstein Johnson (LJ) media; then the bacterial cultures were incubated at 28-30 °C for 3days up to 4 weeks and suspected colonies were stained with acid fast stain to confir
... Show MoreThis study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database.
The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species.
Information of specimens' collection for each species, synonyms and geographical distribution were provided.
This study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database. The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species. Information of specimens' collection for each species, synonyms and geographical distribution were provided.
Background: Hemorrhoids are one of the most
common surgical conditions .Conventional
haemorrhoidectomy was the traditional operation for
the treatment of hemorrhoids. Other modalities of
treatment had been used as an alternative operations
including CO2 laser haemorrhoidectomy.
Objectives: To determine the outcome of treatment
of hemorrhoids by using CO2 laser
haemorrhoidectomy and its advantages over
conventional surgery
Methods: This is a retrospective comparative
interventional study of 1024 case of third degree
haemorhoids selected out of 1300 case of
hemorrhoids of different degrees, admitted to
ALKINDY, ALYERMOUK teaching hospitals and
ABD ALMAGEED private hospital, from May 1998
to J
The development of thyroid gland in five developmental stages of common carp, Cyprinus carpio L. The thyroid originates from the pharyngeal floor as a median ventral keel in late embryos having four pairs of arches. It differentiates into profollicular aggergations and true follicles with flattened walls and empty lumina or with lumina filled with cotton waste-like material in three days-old elvers. Secretion of homogeneous eosinophilic colloid with a limited increase in the height of follicular wall is noted in five days-old elvers. In nine days-old individuals the follicles increase in size due to coallescence. The thyroid gland reaches its maximal activity as judged by its histology in one-two months-old individuals. The gland is of t
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More
