Multiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain method for multiple eliminations. The method is tested on a fake reflection event to authorize their validity, and applied to a real field X-profile 2D seismic data from southern Iraq. The results ensure the possibility of internal multiple types existing in the deep reflection data in Iraq and have to remove. So that the interpretation for the true reflectors be valid. The final processed stacked seismic data using normal move out- frequency-wavenumber domain technique shows good, clear, and sharp reflectors in comparison with the conventional normal move out stack data. Open-source Madagascar reproducible package is used for processing all steps of this study and the package is very efficient, accurate, and easy to implement normal move out, frequency-wavenumber domain, Dip-filter programs. The aim of the current study is to separate internal multiples and noise from the real 2D seismic data.
This study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b
... Show MoreThe aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di
... Show Moreresearch summary
Praise be to Allah، and prayers and peace be upon His Messenger and His chosen one، his family، companions and his family and his family.
After that، this is a study on the question of the claim، as one of the controversial questions that are the mainstay of debates، and I looked at it: the limit of the question of the claim، its importance، its impact، its aspects of corruption، its sections، and the representation of its sections of the fundamentalist controversy;
The research was according to the following plan:
Introduction، in which she mentioned: the importance of the research topic and the reason for its selection، its questions، its l
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreMany reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis
This study aimed at identifying the extent to which the social worker used the techniques of group discussion in the professional practice with the groups of school activity in the schools of Tubas governorate in light of some variables (gender, years of experience, academic qualification). The analytical descriptive method was used due to its suitability for the objectives of the study. A questionnaire was designed to collect data that included (30) items, distributed in three areas .The validity and reliability of the tool were verified and then distributed to the study sample.
The results of the study showed that the highest averages were in the discussion stage domain, where the pre-discussion stage was m
... Show MoreBackground: This study aimed to use the combined mesio-distal crowns widths of maxillary incisors and first molars as predictors to the combined mesio-distal crowns widths of maxillary and mandibular canines and premolars. Materials and methods: The sample included 110 Iraqi Arab subjects with an age ranged between 17-25 years and class I skeletal and dental relations. The crown widths of maxillary teeth and mandibular canines and premolars were measured at the largest mesio-distal dimension on the study casts using digital electronic caliper with 0.01 mm sensitivity. Pearson’s correlation coefficient was used to determine the relation between the combined mesio-distal crowns widths of maxillary incisors and first molars and the combined
... Show More