Amplitude variation with offset (AVO) analysis is an 1 efficient tool for hydrocarbon detection and identification of elastic rock properties and fluid types. It has been applied in the present study using reprocessed pre-stack 2D seismic data (1992, Caulerpa) from north-west of the Bonaparte Basin, Australia. The AVO response along the 2D pre-stack seismic data in the Laminaria High NW shelf of Australia was also investigated. Three hypotheses were suggested to investigate the AVO behaviour of the amplitude anomalies in which three different factors; fluid substitution, porosity and thickness (Wedge model) were tested. The AVO models with the synthetic gathers were analysed using log information to find which of these is the controlling parameter on the AVO analysis. AVO cross plots from the real pre-stack seismic data reveal AVO class IV (showing a negative intercept decreasing with offset). This result matches our modelled result of fluid substitution for the seismic synthetics. It is concluded that fluid substitution is the controlling parameter on the AVO analysis and therefore, the high amplitude anomaly on the seabed and the target horizon 9 is the result of changing the fluid content and the lithology along the target horizons. While changing the porosity has little effect on the amplitude variation with offset within the AVO cross plot. Finally, results from the wedge models show that a small change of thickness causes a change in the amplitude; however, this change in thickness gives a different AVO characteristic and a mismatch with the AVO result of the real 2D pre-stack seismic data. Therefore, a constant thin layer with changing fluids is more likely to be the cause of the high amplitude anomalies.
In this paper, CdS/Si hetrojunction solar cell has been made by
Chemical Bath Deposition (CBD) of CdS thin film on to
monocrystalline silicon substrate. XRD measurements approved that
CdS film is changing the structure of CdS films from mixed
hexagonal and cubic phase to the hexagonal phase with [101]
predominant orientation. I-V characterization of the hetrojunction
shows good rectification, with high spectral responsivity of 0.41
A/W, quantum efficiency 90%,and specific detectivity 2.9*1014
cmHz1/2W -1 .
The effect of three high temperatures for five exposure periods on the developments of larvae, pupae and adults of Trogoderma granarium (Everts) and their biological performance were investigated. The results revealed that the percent of mortality was increased as the temperature and the exposure period increased, e. g. exposing last instar larvae to 45°C for 6 hrs caused 100% death of this stage, while exposing adults (1-3) days old to the same temperature and exposure time resulted in that these adults did not able to survive more than 24 hrs.; in addition, the results showed that the ability of reproduction of adults was depended on the temperature, duration of exposure and the sex.
Abstract
Objective(s): To evaluate high school male students' knowledge about substance use, to determine the effectiveness of the education program on high school mal students' knowledge about substance use.
Methodology: A quasi-experimental (pre-posttest) design was carried out to determine the effectiveness of an educational program on knowledge of high school students about substance use in AL-Kut city. The study was started from 20th h September 2022 to 24th November 2022. The sample was non-probability (purposive sample) sample of (60) student were selected according to the study that are working in Al Kut Education Directo
... Show MoreABSTRACT Fifty extremely halophilic bacteria were isolated from local high salient soils named Al-Massab Al-Aam in south of iraq and were identified by using numerical taxonomy. Fourty strains were belong to the genus Halobacterium which included Hb. halobium (10%). Hb. salinarium (12.5%), Hb.cutirubrum (17.5%), Hb-saccharovorum (12.5%), Hb. valismortis (10%) and Hb. volcanii (37.5%). Growth curves were determined. Generation time (hr) in complex media and logarithmic phase were measured and found to be 10.37±0.59 for Hb. salinarium. 6.49 ± 0.24 for Hb.cutirubrum. 6.70±0.48 for Hb-valismonis, and 11.24 ± 0.96 for Hb. volcanii
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreThe achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they includ
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreIncreasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authen
... Show More