Preferred Language
Articles
/
ijs-4286
Aquifer depth determination of low permeability layers using geo-resistivity data: A case study of Enyigba mine area and environs, South Eastern Nigeria
...Show More Authors

      Many geophysical methods have been applied to locate groundwater in Nigeria’s rural and urban villages. Locating groundwater in low permeability formations like shales and siltstones is even more challenging due to the difficulty of mapping fracture zones within these formations. The fracture zones serve as potential aquifers in low permeability formations and have been the object of groundwater search in shales, siltstones and other low permeability formations. The electrical resistivity method has proven helpful in fracture mapping within low permeability formations due to the existing resistivity contrast usually observed between the fractured and non-fractured sections in the Shales and Siltstones. Three vertical electrical geosounding datasets (VES 1, VES 2 and VES 3) were acquired in the Schlumberger configuration, using a maximum current electrode spacing of 200m to delineate the fracture zones based on their electrical resistivities. The acquired datasets were processed and modelled using IP12 Win software, while the processed datasets were correlated with local geology to estimate the depths of the fractured shales in the area. Results show five modelled geo-electric layers with depths to the fractured shales ranging from 17-25m, while aquifer thicknesses range from 7 to 12m. Aquifer resistivities range from 58 - 115 ohm-m. The curves are primarily of the QH type. One of the Vertical Electrical Sounding Data points (VES 2) encountered an anomalously low resistivity zone at a depth range of 5 to 8m which was interpreted as a galena lode. The low resistivity zone has been confirmed through exploratory drilling to tie with Lead-Zinc lodes at a depth of 8m.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Specificity of Government Expenditure Decisions and their Reflection in Financial Performance / Case Study in Diyala Governorate Sewerage Directorate
...Show More Authors

The research examines the extent to which government spending decisions can affect the level of the financial performance of the directorate. The research problem was based on the financial reality of the Directorate of Sewerage of Diyala province. Spending on the Directorate of the research area. To achieve a set of objectives: indicate the impact of government spending decisions on financial performance, the use of financial analysis to assess the performance of the Directorate. The research adopted financial analysis tools, a set of financial ratios, through which the spending decisions taken by the Directorate of the field of research will be evaluated, and during the period (2014-2018). The research also adopted statistical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
A Novel Semi Automated On-Line Determination of Oxonium Ion Via Precipitation Reaction Using a New Mode of Attenuated Measurement of Incident Light (0 – 180o) by AYAH 5SX4-ST-5D Solar CFI Analyser.
...Show More Authors

Strong acids were determined via the precipitation reaction of loaded copper (II) ion on strong cation exchange resin which in turn reacts with potassium hyxacyano ferrate (II). The attenuation effect of formed precipitate Cu2 [Fe (CN) 6] on (0 -180o) incident LED light was measurement via homemade AYAH 5SX4-ST-5D solar CFI analyser. Optimum parameters were 0.005M.L-1 [Fe(CN)6]-4 , flow rate of 2.4 mL.min-1 , sample volume 204 μL , sample purge time of 64 seconds was chosen, and 1.6 V for light intensity. A liner calibration graph of 0.005 -0.2 M.L-1 were obtains for HCl, HNO3, HCLO4 and H2SO4, with a linearity (r2 %) 96 -97 % and L.O.D based on gradual dilution of lowest concentration in calibration graph was 37.19 μg for HCl, 64.273

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Cluster Analysis by Using Nonparametric Cubic B-Spline Modeling for Longitudinal Data
...Show More Authors

Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.

In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.

The longitudinal balanced data profile was compiled into subgroup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Robust Tests for the Mean Difference in Paired Data using Jackknife Resampling Technique
...Show More Authors

     The paired sample t-test is a type of classical test statistics that is used to test the difference between two means in paired data, but it is not robust against the violation of the normality assumption. In this paper, some alternative robust tests are suggested by combining the Jackknife resampling with each of the Wilcoxon signed-rank test for small sample size and Wilcoxon signed-rank test for large sample size, using normal approximation. The Monte Carlo simulation experiments were employed to study the performance of the test statistics of each of these tests depending on the type one error rates and the power rates of the test statistics. All these tests were applied on different sa

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Evaluation Efficiency of Wind Turbines for Barjisiah (South of Iraq) Wind Plant
...Show More Authors

The main objective of the paper is to study the possibility of erecting 2 MW wind turbine in the south of Iraq (Barjisiah site) by utilizing WAsP model. Wind potential and output predicted the power of WT at a supposed site was calculated. The results for proposed WT showed the WT has a weak performance due to its high capacity and low potential of wind speeds at this site. So, the WT will provide power for a limited time during the year due to its operating at the zone under the rated wind speed.

View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Journal Of Engineering
DESIGN, CONSTRUCTION AND TESTING OF LOW SPEED WIND TUNNEL WITH ITS MEASUREMENT AND INSPECTION DEVICES
...Show More Authors

A low speed open circuit wind tunnel has been designed, manufactured and constructed at the Mechanical Engineering Department at Baghdad University - College of Engineering. The work is one of the pioneer projects adapted by the R & D Office at the Iraqi MOHESR. The present paper describes the first part of the work; that is the design calculations, simulation and construction. It will be followed by a second part that describes testing and calibration of the tunnel. The proposed wind tunnel has a test section with cross sectional area of (0.7 x 0.7 m2) and length of (1.5 m). The maximum speed is about (70 m/s) with empty test section. The contraction ratio is (8.16). Three screens are used to minimize flow disturbances in the test section.

... Show More
View Publication