Many geophysical methods have been applied to locate groundwater in Nigeria’s rural and urban villages. Locating groundwater in low permeability formations like shales and siltstones is even more challenging due to the difficulty of mapping fracture zones within these formations. The fracture zones serve as potential aquifers in low permeability formations and have been the object of groundwater search in shales, siltstones and other low permeability formations. The electrical resistivity method has proven helpful in fracture mapping within low permeability formations due to the existing resistivity contrast usually observed between the fractured and non-fractured sections in the Shales and Siltstones. Three vertical electrical geosounding datasets (VES 1, VES 2 and VES 3) were acquired in the Schlumberger configuration, using a maximum current electrode spacing of 200m to delineate the fracture zones based on their electrical resistivities. The acquired datasets were processed and modelled using IP12 Win software, while the processed datasets were correlated with local geology to estimate the depths of the fractured shales in the area. Results show five modelled geo-electric layers with depths to the fractured shales ranging from 17-25m, while aquifer thicknesses range from 7 to 12m. Aquifer resistivities range from 58 - 115 ohm-m. The curves are primarily of the QH type. One of the Vertical Electrical Sounding Data points (VES 2) encountered an anomalously low resistivity zone at a depth range of 5 to 8m which was interpreted as a galena lode. The low resistivity zone has been confirmed through exploratory drilling to tie with Lead-Zinc lodes at a depth of 8m.
Objective: To suggest a weighted measure to diagnose the reasons for the low student success ratios in mathematics concerning the third grade of intermediate schools in light of components educational system represented by: [Students, Teachers, Curriculum, and Environmental reasons (others reasons)] assuming differentiated and interrelated components, Also the effectiveness forming of these components according to the gender variable. Methods: Data collection tools were prepared by constructing two questionnaires for each of (Students and Teachers), which included a number of items that involved some domains for studied components of educational system, which demonstrated a high level of validity and reliability in the pilot study, in addi
... Show MoreFlexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy
... Show MoreIt is suitable to use precast steel-concrete composite beams to quickly assemble a bridge or a building, particularly in isolated regions where cast-in-situ concrete is not a practical option. If steel-concrete composite beams are designed to allow demountability, they can also be extremely useful in the aftermath of natural disasters, such as earthquakes or flooding, to replace damaged infrastructure. Furthermore, rapid replacement of slabs is extremely beneficial in case of severe deterioration due to long-term stressors such as fatigue or corrosion. The only way to rapidly assemble and disassemble a steel-concrete composite structure is to use demountable shear connectors to connect/disconnect the steel beams to/from the concrete slab. I
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreTwitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show MoreThe present study aims to assess the water quality and the hydrochemical characteristics and seasonal variation of surface water on the aspect of trace elements in Al-Tarmiyah District, Baghdad, Iraq. Ten water samples were collected, four from surface water and six from groundwater on October 2017, and on April 2018. All samples were analyzed for physiochemical parameters such as water temperature, pH, EC, TDS,TH,TSS, major ions (Ca2+, Mg2+, Na+, K+, SO42-, Cl-, and HCO3-), and nutrients (NO3-, and PO43-). In addition, samples were analyzed for trace elements that include Fe, Al, Pb, Zn, Mn, Cr,
... Show MoreThe importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process. The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason
... Show MoreThe problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni
... Show MoreThe dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthoriz
... Show More