Amplitude variation with offset (AVO) analysis is an 1 efficient tool for hydrocarbon detection and identification of elastic rock properties and fluid types. It has been applied in the present study using reprocessed pre-stack 2D seismic data (1992, Caulerpa) from north-west of the Bonaparte Basin, Australia. The AVO response along the 2D pre-stack seismic data in the Laminaria High NW shelf of Australia was also investigated. Three hypotheses were suggested to investigate the AVO behaviour of the amplitude anomalies in which three different factors; fluid substitution, porosity and thickness (Wedge model) were tested. The AVO models with the synthetic gathers were analysed using log information to find which of these is the controlling parameter on the AVO analysis. AVO cross plots from the real pre-stack seismic data reveal AVO class IV (showing a negative intercept decreasing with offset). This result matches our modelled result of fluid substitution for the seismic synthetics. It is concluded that fluid substitution is the controlling parameter on the AVO analysis and therefore, the high amplitude anomaly on the seabed and the target horizon 9 is the result of changing the fluid content and the lithology along the target horizons. While changing the porosity has little effect on the amplitude variation with offset within the AVO cross plot. Finally, results from the wedge models show that a small change of thickness causes a change in the amplitude; however, this change in thickness gives a different AVO characteristic and a mismatch with the AVO result of the real 2D pre-stack seismic data. Therefore, a constant thin layer with changing fluids is more likely to be the cause of the high amplitude anomalies.
This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreIn this paper, the static analysis for finding the best location of boxes inside the composite wing-box structure has been performed. A software ANSYS (ver.11) was used to analyses the Aluminum wing to find the maximum stresses reached in. These results are used as a base for the composite wingbox to find the numbers of layers and location of the box beam and its dimensions so that the composite wingbox may carry the same loading conditions in the Aluminum wing. Analysis showed that a composite wingbox having two boxes is better than the single or triple boxes wing based on stress to weight ratio. Mass saving of (40%) had been achieved when composite wing-box is used instead of Aluminum wing.
Introduction: Nitrofurantoin (NFT) is abroad spectrum bactericidal antibiotic. The bioavailability of NFT is affected by many factors. Samafurantin® tablets containing 50 mg NFT were manufactured by Samarra drug industry. Urinary excretion studies were employed since; the urinary tract is the main site of NFT action and excretion. Objective: The objective of the study was to investigate the effect of Uricol® and food on secondary pharmacokinetic parameters of Samafurantin® tablets with different doses by applying urinary data. Methods: Twelve healthy male volunteers participated in this study. Urine samples were collected from each volunteer after overnight fasting at a specified time intervals which considered as a blank sample for meas
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show MoreAlPO4 catalysts supported with WO3 were prepared by impregnating the catalysts with ammonium metatungstate. The catalysts were checked by X-ray Diffraction (XRD), AFM, and SEM; also, the catalysts analysis was done by X-Ray (EDX). Finally, the N2 adsorption-desorption was used to measure the pore volume and surface area of the catalyst. The prepared catalyst has a surface area of 185.83 m2/g, pore volume of 0.645 cm3/g at a calcination temperature of 500°C for 3 hrs, and particle size of AlPO4 with an average of 35.36 nm. Transesterification of edible oil using WO3/AlPO4 was performed, it was observed that WO3/AlPO4 catalysts give high conversion of edible oil, and this is attributed to the high surface area, smaller particle size, and the
... Show More
This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show More