Preferred Language
Articles
/
fxd9Qo8BVTCNdQwC6mdM
Multiple and Coherent Noise Removal from X-Profile 2D Seismic Data of Southern Iraq Using Common Depth Point Muting Procedures and Depending on Madagascar Open-Source Package
...Show More Authors

This article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and stacking, and the second stage is muting. Many Common Depth Point gathers are tested to select the proper muting dimension, later on; the auto pick for the muted semblance is done for the whole 2D seismic data. The following step is to stack the Normal Move Out corrected data. Differences are calculated between the two stages of the process which greatly help to determine the eliminated multiple locations within the sedimentary secession. This will reduce the risk of interpreting these sequences as primary reflectors spatially within deep thin layers. Madagascar open source package is used in these processing steps. Madagascar open source package is very efficient, accurate, and easy to correct any part of the Python code used in the two stages of processing.

Scopus Crossref
View Publication
Publication Date
Tue Aug 02 2022
Journal Name
Muthanna Journal For Admisrative And Economic Sciences
MEASURING AND ANALYSING THE CAUSAL RELATIONSHIP BETWEEN AGRICULTURAL TERMS OF TRADE AND SOME AGRICULTURAL VARIABLES IN IRAQ FOR THE PERIOD 1990-2019
...Show More Authors

The research aims to investigate the existence of a direct causal relationship between selected agricultural variables: agricultural output (as a representative of growth in the agricultural sector), agricultural terms of trade as a completely new variable in agricultural studies in recent years, agricultural labour which is an important part in the total workforce for Iraq, and finally, agricultural investment because of its importance and vital role in the production process, creating job opportunities, and then raising the level of employment, then it's role to achieving agricultural growth and development. For this purpose, the researchers used the Toda-Yamamoto causality methodology for a time series covering from 1990 to 2019. The res

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Evaluation of Some Heavy Metals, Their Fate and Transportation in Water, Sediment, and Some Biota within AL-Musayyib River, Babylon Governorate, Iraq
...Show More Authors

This study estimated seven heavy metals (Fe, Cu, Zn, Pb, Ni, Cd, Cr) in water (dissolved and particulate phase), sediments and some aquatic organisms including two species from aquatic plants (Ceratophyllum demersum&Phragmites australis); one species of clam (Psedontopeses euphratics) and two species from fish (Oreochromis aureus& Leuciscus vorax)in four sites within Mashroo AL- Musayyib channel project/ branch  of Euphrates river, Babylon , medial of Iraq . This aims to show the concentration of these elements, their fate and the mechanisms of their transmission through the food chain in this lotic aquatic system ; also in addition to examining  some physicochemical properties of ri

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Mon Feb 09 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Congenitally missing and supernumerary teeth among a group of 3-12 years old children with cleft lip and/ or palate in Iraq
...Show More Authors

Background: There are many congenital anomalies associated with cleft lip and/or palate. This research is to study the prevalence of congenitally missing teeth and supernumerary teeth in this population group. Materials and Method: One hundred eight cleft lip and/or palate Iraqi patients had participated in this study (57 male, 51 female), 3-12 years of age. 26 of them had orthopantomogram were within (6-12) years of age were inspected for congenitally missing teeth and supernumerary teeth. Patients whom age range 3-5 years were checked for the congenitally missing teeth by clinical examination with strongly insisting the teeth were not missed due to caries or trauma. Results: There were 19(73.076%) patients with 41 congenitally missing tee

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
The pathological changes of the digestive system for Anas platyrhychos in Baghdad and Kut in Iraq which infectel with platyhelminthes and nematodes
...Show More Authors

A total of 247 Mallard ( Anas platyrhynchos platyrhynchos L.) from Baghdad and Kut were examined for the Cestodes Diorchis stefanskii Sobolevicanthes gracilis; Hymenolepis mastigopraditae and the Nematode Amidostomum acutum in the first time in Iraq . Among these , 151 birds were found infected by these helminthes It has been found small nodules on the external surface of the intestine , Ulceration of mucosa inflammatory infiltrate , Oedemats changes and hyperplasia in the section of infected intestine were noticed.

View Publication Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Merge Operation Effect On Image Compression Using Fractal Technique
...Show More Authors

Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.

View Publication Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Research In Medical And Dental Science
Evaluation of the Serum Level of Interleukin-6 in Patients Undergoing Surgical Removal of Impacted Mandibular Third Molars
...Show More Authors

Evaluation of the Serum Level of Interleukin-6 in Patients Undergoing Surgical Removal of Impacted Mandibular Third Molars, Hussain A Taher*, Salwan Y Bede

View Publication Preview PDF
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Effect of Aquatic, Alcoholic and Oily Extracts of Cocos nucifera L.on the Growth of Certain Pathogenic Bacteria Isolated from Wounds and Burns Infections
...Show More Authors

Three types of extracts ( aquatic, alcoholic, and oily ) were prepared from the fruits of coconuts, and a series of chemical tests were conducted in addition to the use of the FTIR equipment to determine the active locations in the prepared extracts. The results indicated the presence of active compounds (tannins, saponins, flavonoids, turbines and steroids) in the extracts prepared from the fruits of coconuts, also the antimicrobial capability of these extracts were tested on pathogenic bacteria isolated from wounds and burns infections cases. The results proved that the concentration 80 mg/ml of the aquatic extract is the minimum inhibitory concentration for the microbes: Proteus vulgaris and Pseudomonas fluorescence, while the

... Show More
View Publication Preview PDF
Crossref