Preferred Language
Articles
/
fxd9Qo8BVTCNdQwC6mdM
Multiple and Coherent Noise Removal from X-Profile 2D Seismic Data of Southern Iraq Using Common Depth Point Muting Procedures and Depending on Madagascar Open-Source Package
...Show More Authors

This article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and stacking, and the second stage is muting. Many Common Depth Point gathers are tested to select the proper muting dimension, later on; the auto pick for the muted semblance is done for the whole 2D seismic data. The following step is to stack the Normal Move Out corrected data. Differences are calculated between the two stages of the process which greatly help to determine the eliminated multiple locations within the sedimentary secession. This will reduce the risk of interpreting these sequences as primary reflectors spatially within deep thin layers. Madagascar open source package is used in these processing steps. Madagascar open source package is very efficient, accurate, and easy to correct any part of the Python code used in the two stages of processing.

Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Thu Feb 12 2026
Journal Name
Journal Of Engineering
Drag Reduction Using Passive Methods on KIA PRIDE Car Model
...Show More Authors

An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Cytogenetic effect of crude aqueous extract from leaf of Lycium barbarum on root tip of Allium cepa L.
...Show More Authors

This study was carried out to investigate the cytogenetic effects of crude aqueous extract of Lycium barbarum on the roots tip of Allium cepa Using three concentration 125, 25, 50 mg/ ml for 2, 4, 6 hours treatment periods.This study were included some cytogenetic analysis such as mitotic index , phase index and chromosome aberration. The data showed that the treatment with 50mg/ml for 6huors led to reduce the mitotic index less than 50% . This reduction considered to have toxic and sublethal effect . These results revealed mutagenic potency by inducing differents type of chromosome aberration.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Effect of the application of IFRS 15 "Revenue from contracts with customers" on the quality of financial reporting
...Show More Authors

Abstract

This study aims at identifying the impact of the application of IFRS 15 "Revenue from contracts with customers on the quality of financial reporting, through application to faculty members in the accounting departments of Iraqi universities and auditors. The problem of the study was the multiplicity of accounting rules and standards Which deals with the issues of revenue recognition , as well as the lack of consistency of most of them with the common framework of financial accounting, which results in low quality of financial reporting in the current financial statements, where the formulation of one hypothesis was the lack of relationship of significant significance The application of IFRS 15 "Recognition of rev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 06 2011
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of essential oil extracted from yellow peel of Citrus aurantium L. on growth of some fungi
...Show More Authors

جريت دراسة مختبرية لمعرفة تأثير الزيت الطيار لقشور ثمار نبات النارنج الصفرC. aurantium تجاه النمو السطحي للفطريات Penicillium expansum، Aspergillus flavus و Fusarium oxysporum ، أظهرت نتائج الفعالية التثبيطية للزيت الطيار تأثيراً معنويا متفاوتاً في الفطريات المشمولة بالدراسة، إذ كان الزيت الطيار أكثر تأثيرأَ في الفطر P. expansum تلاه الفطر A. flavus ،في حين كان الفطر oxysporum F.أقل حساسية تجاه الزيت الطيار. بصورة عامة اظهر الزيت الطيار تأثيرا تثبيطيا

... Show More
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Extraction and Characterization of rapeseed oil (Brassca campestris ) and it's Effected on Microorganisms
...Show More Authors

Oil from Brassca campestris (local variety) was extracted with hexane using Soxhlet. The extracted oil was characterized and its antimicrobial activity was determined as well. The content of extracted oil was 40% with 0.5% of volatile oil .Oil was immiscible with polar solvent such as ethanol, acetone and water, while it was easily miscible with chloroform due to its hydrophobicity. The result of organoleptic tests revealed that the oil is clear yellow in color and odorless with acceptable taste. The oil was stable at 4 -25 C? for a month. Refractive index (RI) of oil was 1.4723 with density of 0.914, [both at 4-25 C?]. Boiling point 386 C?. Infra red spectroscopy (IR) indicated the presence of different chemical groups (C=C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
On (σ,τ)-Derivations and Commutativity of Prime and Semi prime Γ-rings
...Show More Authors

Let R be a Г-ring, and σ, τ be two automorphisms of R. An additive mapping d from a Γ-ring R into itself is called a (σ,τ)-derivation on R if d(aαb) = d(a)α σ(b) + τ(a)αd(b), holds for all a,b ∈R and α∈Γ. d is called strong commutativity preserving (SCP) on R if [d(a), d(b)]α = [a,b]α(σ,τ) holds for all a,b∈R and α∈Γ. In this paper, we investigate the commutativity of R by the strong commutativity preserving (σ,τ)-derivation d satisfied some properties, when R is prime and semi prime Г-ring.

View Publication Preview PDF
Crossref