This article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and stacking, and the second stage is muting. Many Common Depth Point gathers are tested to select the proper muting dimension, later on; the auto pick for the muted semblance is done for the whole 2D seismic data. The following step is to stack the Normal Move Out corrected data. Differences are calculated between the two stages of the process which greatly help to determine the eliminated multiple locations within the sedimentary secession. This will reduce the risk of interpreting these sequences as primary reflectors spatially within deep thin layers. Madagascar open source package is used in these processing steps. Madagascar open source package is very efficient, accurate, and easy to correct any part of the Python code used in the two stages of processing.
This study was conducted in the poultry field of the Department of Animal Production/ College of Agricultural Engineering Sciences / University of Baghdad for the period from 42 days. Aiming to know the effect of using shrimp waste powder (Metapenaeus Affinis) and enzyme in broilers diet on physiological and microbial performance and indicators of fat oxidation in meat. 250 one-day-old ROSS308 chicks were used. The chicks were fed on diets containing shrimp waste treated with enzyme and not treated with protease enzyme by 0,4,6 %. The experiment included five treatments, with 5 replicates for each treatment, and each replicate contained 10 birds. The results showed a significant decrease (P≤0.05) in the concentration of ALT and AS
... Show MoreSeeds of Nigella sativa were sown in containers containing 15kg Loamy soil. The seeds were divided before sewing into two groups. The first group was soaked with ordinary tap water end the second group was treated with magnetized water for 24hrs. The irrigation process was completed until 75% of capacity field with two types of water (tap water of magnetized water with three replications).The magnetized water was obtained from special electric device designed for this purposeRecorded measurements (plants height, the number of branches/ plant, dry weight ofplant, number of flowers, 1000 seed weight) during the harvest period.Results indicated that the seed group which was treated with magnetized water was more significant than the one which
... Show MoreA field experiment was carried out in Horticulture Department / Collage of Agricultur e/University of Baghdad to study influence of adding ascorbic acid(asa) and bread yeast extract in snap bean cv.primel under irrigation with saline water using sodium chloride salt (NaCl) during spr ing season of 2016 .A factorial experiment using Randomized Complete Block Design( RCBD) with three replications wereconducted . The first factor includes three treatments of salinity which were tap water ( S0), 4ds.m-1(S1) and 8ds.m-1 (S2) . The second factor includes three treatments which were control treatment without any adding (C) ,ascorbic acid 0.3g.l-1( A ) and yeast extract 12g.l -1( Y ). Results showed significant and gradually decreases in all studie
... Show MoreIn the current research, the work concentrated on studying the effect of curvature of solar parabolic trough solar collector on wind loading coefficients and dynamic response of solar collector. The response of collector to the aerodynamic loading was estimated numerically and experimentally. The curvature of most public parabolic trough solar collectors was investigated and compared. The dynamic response of solar collector due to wind loading was investigated by using numerical solution of fluid-structure interaction concept. The experimental work was done to verify the numerical results and shows good agreement with numerical results. The numerical results were obtained by using finite element software package (ANSYS 14). It was found
... Show MoreThis study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
The new Hexadentate complexes type [M(H3L3)]K were prepared from the condensation reaction of Diphenylmonoxime and KOH with (Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II)) in methanol with 3:1 ligand : metal ratio to give a series of new complexes of the general formula [M(H3L3)]K (where: M(II) = Mn ,Co ,N ,Cu ,Zn and Hg).All compounds have been Characterized by spectroscopic methods [I.R, U.v-Vis, atomic absorption and microanalysis (C.H.N) along with conductivity measurements. The stability constant K and Gibbs free energy ∆G were calculated for [Co (H3L3)] K, [Ni (H3L3)] K and [Cu (H3L3)] K and complexes using spectrophotometer method. The obtained values indicate that these complexes stable in their solution. From the above data
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More