Preferred Language
Articles
/
fRd8Qo8BVTCNdQwCfGdR
Multiple and Coherent Noise Removal from X-Profile 2D Seismic Data of Southern Iraq Using Normal Move Out-Frequency Wavenumber Technique
...Show More Authors

Multiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain method for multiple eliminations. The method is tested on a fake reflection event to authorize their validity, and applied to a real field X-profile 2D seismic data from southern Iraq. The results ensure the possibility of internal multiple types existing in the deep reflection data in Iraq and have to remove. So that the interpretation for the true reflectors be valid. The final processed stacked seismic data using normal move out- frequency-wavenumber domain technique shows good, clear, and sharp reflectors in comparison with the conventional normal move out stack data. Open-source Madagascar reproducible package is used for processing all steps of this study and the package is very efficient, accurate, and easy to implement normal move out, frequency-wavenumber domain, Dip-filter programs. The aim of the current study is to separate internal multiples and noise from the real 2D seismic data.

Scopus Crossref
View Publication
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Efficiency Measurement Model for Postgraduate Programs and Undergraduate Programs by Using Data Envelopment Analysis
...Show More Authors

Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.

 

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Natural And Engineering Sciences
Comparison of Some Soil Mineral’s Ability to Adsorb and Release Lead and Rates of its Removal From its Aqueous Solutions
...Show More Authors

To study the comparative use of some soil minerals (zeolite, bentonite, phosphate rock, and limestone) in the adsorption and release of lead and its removal rates from its aqueous solutions using adsorption equations. Two laboratory experiments were carried out for the adsorption and release of lead. The adsorption experiment took 0.5 g of some of the above soil minerals. Lead was added as Pb (NO3)2 at levels of 3.0, 2.0, 1.5, 1.0, 0.5, and 0.0 mmol L-1 containing a concentration of 0.01M of calcium chloride. The experimental unit’s number was 72, the concentration of dissolved lead in the equilibrium solution was estimated and the amount of lead adsorbed was calculated. As for the lead release experiment, samples fo

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Case Studies In Construction Materials
Push-out test of waste sawdust-based steel-concrete – Steel composite sections: Experimental and environmental study
...Show More Authors

View Publication
Scopus (19)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Case Studies In Construction Materials
Push-out test of waste sawdust-based steel-concrete – Steel composite sections: Experimental and environmental study
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
The frequency of skin tumors and infections in patients with autoimmune diseases
...Show More Authors

KE Sharquie, AA Noaimi, ZT Burhan, Journal of Cosmetics, Dermatological Sciences and Applications, 2016 - Cited by 9

View Publication
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Food Frequency Intake and Dietary Habits for Diabetic Pregnant Women
...Show More Authors

Objective: The study aims at assessing the food frequency intake and dietary habits for diabetic pregnant
women.
Methodology: A descriptive study is carried out for the period from November4th 2013 to August
25th 2014. A purposive "non-probability" sample of one hundred diabetic pregnant women is selected from
the Diabetic and Endocrine Center in Al-Amarha City. A questionnaire is developed as a tool of data
collection. Content validity of the study instrument is determined through panel of experts. Split-half
reliability technique is used for reliability determination of the study instrument which depicts a reliability
coefficient of (0.79) for the entire scale. A structured interview with each diabetic pregnant wom

... Show More
View Publication Preview PDF