Many geophysical methods have been applied to locate groundwater in Nigeria’s rural and urban villages. Locating groundwater in low permeability formations like shales and siltstones is even more challenging due to the difficulty of mapping fracture zones within these formations. The fracture zones serve as potential aquifers in low permeability formations and have been the object of groundwater search in shales, siltstones and other low permeability formations. The electrical resistivity method has proven helpful in fracture mapping within low permeability formations due to the existing resistivity contrast usually observed between the fractured and non-fractured sections in the Shales and Siltstones. Three vertical electrical geosounding datasets (VES 1, VES 2 and VES 3) were acquired in the Schlumberger configuration, using a maximum current electrode spacing of 200m to delineate the fracture zones based on their electrical resistivities. The acquired datasets were processed and modelled using IP12 Win software, while the processed datasets were correlated with local geology to estimate the depths of the fractured shales in the area. Results show five modelled geo-electric layers with depths to the fractured shales ranging from 17-25m, while aquifer thicknesses range from 7 to 12m. Aquifer resistivities range from 58 - 115 ohm-m. The curves are primarily of the QH type. One of the Vertical Electrical Sounding Data points (VES 2) encountered an anomalously low resistivity zone at a depth range of 5 to 8m which was interpreted as a galena lode. The low resistivity zone has been confirmed through exploratory drilling to tie with Lead-Zinc lodes at a depth of 8m.
Informativity, being an essential component of text/discourse, plays a significant role in highlighting the intended meaning and finally contributes to the overall process of rendering a text cross-culturally. It has, however, been overlooked by translators in doing their jobs. In poetic translation, informativity plays a particularly significant role as it sheds light on the ungraspable traits of meaning.
This study tries to explore this aspect in a translation of Emily Dickenson's Slant of Lights to see where the translator fell short in this aspect with attempts to produce an alternative translation taking into consideration the various orders of informativity. For this purpose, a model of informativity is forwarded t
... Show MoreConstructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distri
... Show MoreRadon concentrations are measured for water samples collected from twenty wells which were drilled in Hashimiya area in addition to twelve samples of surface water using Alpha Gaurd. 140 samples, 7 for each well, were collected represent wet season in continuous pumping and 20 samples, one for each well, were collected represent dry season. Concentration of radon in groundwater is many times of its concentration in surface water. The minimum concentration in groundwater is about (7) Bq/L and (5) Bq/L while the maximum concentration is about (31) Bq/L and (19) Bq/L in wet season and dry season respectively. The range of radon concentrations in river water is between (1.06) Bq/L and (1.21) Bq/L. This study has indicated that there is a flo
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreEven though image retrieval is considered as one of the most important research areas in the last two decades, there is still room for improvement since it is still not satisfying for many users. Two of the major problems which need to be improved are the accuracy and the speed of the image retrieval system, in order to achieve user satisfaction and also to make the image retrieval system suitable for all platforms. In this work, the proposed retrieval system uses features with spatial information to analyze the visual content of the image. Then, the feature extraction process is followed by applying the fuzzy c-means (FCM) clustering algorithm to reduce the search space and speed up the retrieval process. The experimental results show t
... Show MoreA loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThis research seeks through the adoption of two basic variables, where he considered the actuarial experience as an independent variable, while the process of accepting the risk and dimensions related to it is a dependent variable, the research was adopted to present the data achieved by the company during the life insurance business during the adoption of actuarial experience at the beginning of its work where Adoption of the historical method in the analysis of those data to prove the researcher's opinion, through the analysis of data (5 years) for the first period, which extends between (1975-1979), the period during which the company adopted the actuarial experience at the time, also taken data for the same dimensions related to the
... Show More