Sedimentologic and facies evidences reveal a marine environment for the Gercus Formation. Facies analysis and associated sedimentary structures including graded beddings decide turbidity origin of the rocks. Marine environment is supported by the identifying glauconite and fossils types reported for the first time.
The formation composed of seven lithotypes; shale/claystone, mudstone, sandstone, carbonate, conglomerate, breccias and debris flow, which are arranged in repeated cycles of mixed siliciclastic-carbonate turbidites in a range of gravity-flow regime. The Gercus successions are grouped into four facies associations confirming marine depositional systems, these are (from bottom to top); slump siliciclastic-calciturbidites (dolomite/shale dominated), proximal siliciclastic-calciturbidites (dolomite/sand dominated), distal siliciclastic-calciturbidites (sand/mud dominated) and slope siliciclastic turbidites (sand/clay dominated) respectively.
Petrographic analysis of sandstone units show predominant of lithic fragments, most of it are carbonate with subordinate tuffaceous fragments, chert, chalcedony, volcanic ash, metamorphic and detrital iron oxides grains, with noticeable grains of glauconite. Varieties of marine fossils are identified includes planktonic bivalves and benthic forams of cool water, which support the deeper marine environment. Petrographic examination of carbonate units reveal skeletal grains of benthic and planktonic forams, stromatolite, planktonic bivalves, corals and algae, with non-skeletal grains of chert, chalcedony, tuffaceous fragments, volcanic ash, and volcanic bubbles.
Petrography, lithofacies and lithostratigraphic analysis of the Gercus Formation suggest deposition in developed marine environment, mainly effected by gravity-flow turbidity currents, and displays successive submarine fans of high density turbulent currents in deeper margins. Mixed siliciclastic-carbonate cycles were deposited in intervals of weaning of turbulent currents. Based on clast type and size, it seems likely that a weakly turbulent to laminar gravity-flow phase was present when the flow event entered the basin at the end part of the fan. A change in flow behavior may have led to deposit sand-rich unit with ‘turbidite’ characteristics, which was subsequently grades upwards to clay-dominated unit.
This paper presents new details of lithostratigraphic subdivisions and associations of the Gercus Formation in Koi Dokan area, and new suggested marine environment of deposition. The previous workers suggest continental and probably mixed with deltaic environments in the upper part.
The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to
... Show MoreIn this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a
... Show MoreIn any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe aim of the current study is to in evaluate the role of SOD activity in the previously reported oxidative stress in our laboratory(1), in the patients with different brain tumors. SOD activity was assayed according to riboflavin/NBT method and its specific activity was calculated in patients with benign and malignant brain tumors and control. Moreover the specific activity was compared in these samples according to gender and the occurrence of disease.Non significant elevation (P > 0.05) in SOD specific activity was observed in tissue of malignant tumors in comparison to that of in benign brain tumors. While a highly significant decrease (P < 0.001) of the specific activity was found in sera of malignant patients group in comparison to t
... Show MoreIn this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping, a monotone inward contraction mapping is a monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.
The purpose of this paper is to study a new class of fuzzy covering dimension functions, called fuzzy
Language is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana
... Show MoreFree-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis
... Show More