Upper Cretaceous Oceanic Red Beds (CORBs) are pelagic sediment
deposits that deposited in the Upper Cretaceous basin, with widespread in
part of the world as well as in Iraq. This research investigates the deposition
of cyclic marl and marly limestone CORBs of six selected sections at the
active southern margin of the Tethys during the Late Campanian -
Maastrichtian with petrography, microfacies, and depositional environment.
As this study was not a consideration in the past, so decided to visit and
identify all exposure areas of the Upper Cretaceous period rocks are visited.
This study involved two fields touring reconnaissance extended from
Darbandikhan city in the east south to Shiranish Village in the west north.
Six lithological sections covering the studied area, four sections represent
Cretaceous Oceanic Red Beds (CORBs) and two sections without (CORBs)
for the purpose of comparison between them. The sections are described in
detail and 250 samples were collected from all studied sections.
For the petrography and microfacies analysis 149 thin sections were
studied. The microfacies analysis showing two major successions with Red
Bed and Non-Red Bed marl and marly limestone, occasionally interbedded
with thinly beds of shale, sandstone and siltstone. These comprised of five
microfacies are Oligostegina Marly Limestone, Globotruncana Marly
Limestone, Marlstone with Microfossils, Red Marlstone, and Red to
Variegated Calcareous Sandstone with Radiolarian (Debrise Flow) Making
20 thin sections from Gendilly section(GS) (the typical section of this study)
for microscopic study of minute fossils (nannofossils) examination, for this
study proved that the Cretaceous Oceanic Red Beds (CORBs) dating is
Mastrichtian age. The Microfossils and nannofossils tests proved the
presence of Danian Age in studied area.
This study has proved that the carbonate content in red limestone beds
ranged between 53.5-100.0 %, while this percentage ranged in red marly
rocks between 20.5-50.0 %, But in the rocks that do not contain red beds,
Carbonate content in limestone rocks ranged between 52.0-100.0 %, and in
marl rocks this ratio ranged between 27.5-49.5 %.
In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la
Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.
Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la
In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.
Let R be a ring with identity and M be a right unitary R-module. In this paper we
introduce the notion of strongly coretractable modules. Some basic properties of this
class of modules are investigated and some relationships between these modules and
other related concepts are introduced.