Asjad Amin

Learn More
SUMMARY Salt domes, an important geological structure, are closely related to the formation of petroleum reservoirs. In many cases , no explicit strong reflector exists between a salt dome and neighboring geological structures. Therefore, interpreters commonly delineate the boundaries of salt domes by observing a change in texture content. To stimulate the(More)
Salt bodies play an important role in subsurface geology, therefore accurate salt dome detection is essential for any seismic interpretation task. Detecting salt body boundary and shape accurately, however, is very difficult due to large noise and amplitude variations in seismic data. Due to the limitations of manual picking, automatic segmentation(More)
The identification of reservoir regions has a close relationship with the detection of faults in seismic volumes. However, only relying on human intervention, most fault detection algorithms are inefficient. In this paper, we present a new technique that automatically tracks faults across a 3D seismic volume. To implement automation, we propose a two-way(More)
SUMMARY In this paper, we present a dictionary based classification approach for salt dome detection using texture based attributes. The proposed algorithm overcomes the drawbacks of existing texture attributes based salt dome detection techniques which are heavily dependent upon the relevance of attributes to the geological nature of salt domes and the(More)
This paper presents a modified scheme for run length encoding. A significant improvement in compression ratio for almost any kind of data can be achieved by the proposed scheme. All the limitations and problems in the original run length encoding scheme have been highlighted and discussed in detail in this research paper. A proposed solution has been(More)
SUMMARY In this paper, we examine several typical texture attributes developed in the image processing community in recent years with respect to their capability of characterizing a migrated seismic volume. These attributes are generated in either frequency or space domain, including steerable pyramid, curvelet, local binary pattern, and local radius index.(More)
In this paper, we present a robust image segmentation technique based on the Geodesic Convex Active Contour (GCAC) and the Chan-Vese (CV) model. The proposed algorithm overcomes the drawbacks of existing interactive image segmentation techniques which are heavily dependent upon the initial user input. Here, we propose to start with a Geodesic based contour(More)
A power efficient & secure ROHC scheme has been presented in this paper. This scheme is designed to work efficiently for IPV6 based low power wireless personal area networks. The proposed scheme first implements ROHC followed by a suitable encryption scheme. ROHC can greatly reduce the size without adding too much complexity to the system. This in result(More)
In this paper we discuss about security which is the main element in the wireless communication. As the generation changes many steps are used to improve the security so in this we discuss many security techniques choose, implement and compare two of them which provide better security to customers in LTE Advanced. LTE Advanced is evolved and advanced(More)