Coherent noise such as ground roll and guided wave is present in the seismic line DE21 (East Diwaniya south eastern Iraq) and it obscures seismic signal and degrades from the quality of data. To attenuate the coherent noise from the shot gather and the Stack of the seismic line, AGORA filter was applied in order to obtain the good signal as the hyperbola shape in shot gather and the reflectors will be clearly to interpret it later. It has given good results and the coherent noise was attenuated in high ratio on all the line. The spectrum analysis is confirmed the effectiveness of AGORA filter to attenuate the coherent noise.
Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreThis work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show MoreThe automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show MoreIn this study, a qualitative seismic velocity interpretation is made up through using 2D-seismic reflection data on Luhais oil field in southern of Iraq which is situated at about 105 Km to the east from the Basra city. Luhais oil field was chosen to study the type and nature of the distribution of the seismic velocities of Nahr Umr and Zubair Formations in order to show its explorational importance, where these formations contain abundant quantities of hydrocarbons. Picking of the tops of Nahr Umr and Zubair was carried out from the synthetic seismogram which is calculated from sonic-logs and check shot of well Lu-2. Velocity model was obtained via using an implementation of Petrel program version, 2013 and was corrected according to to
... Show MoreIt is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy i
... Show MoreOur research subject (environmental impact in the cultural output of the civilizations of ancient East) the environmental impact on human civilization and how her and adapted to serve in various cultural aspects especially in ancient cultures whether punches or sculptures and other addresses as well as tracing precious stones and raw materials. It was the environment of the civilizations of Mesopotamia and Egypt and another effective impact in drawing ancient history through human interaction and responsiveness. The Iraqi environment was marked by poverty and cruelty on the one hand and on the other cultural elements contributed to the civilization in General and research dealing with technical and product sourcing raw materi
... Show MoreThree-dimensional seismic reflection study was conducted for the Eastern
Baghdad oil field which is located in the middle part of Iraq within Al-Madaaen
province that belong to Baghdad governarate, South of Diyala River , this field
includes two southern parts (S1 and S2), the study area was about 781.905 km 2 for
the upper Cretaceous age, synthetic seismogram was generated from data of EB-5
and EB-1 wells. Saadi reflector was picked and identified to determine the Hartha
Formation. The seismic sections and time slice maps confirmed that the upper
Cretaceous age was affected by faults and the indicators of faults ended within
Hartha Formation and continue to the deeper formations with increasing intensity.
The
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More