Electrical resistivity tomography (ERT) methods have been increasingly used in various shallow depth archaeological prospections in the last few decades. These non‐invasive techniques can save time, costs, and efforts in archaeological prospection and yield detailed images of subsurface anomalies. We present the results of quasi‐three‐dimensional (3D) ERT measurements in an area of a presumed Roman construction, using a dense electrode network of parallel and orthogonal profiles in dipole–dipole configuration. A roll‐along technique has been utilized to cover a large part of the archaeological site with a 25 cm electrode and profile spacing, respectively. We have designed a new field procedure, which used an electrode array fixed in a frame. This facilitated a very efficient field operation, and overall a total of 9648 electrode positions were occupied. The 3D ERT inversion results clearly characterize the main structures of the Roman foundations. We compared our high‐resolution 3D electrical resistivity model with findings from archaeological excavations, which have been done in some parts of the surveyed area. The ERT result coincide well with the excavation results, i.e. the location as well as the vertical and horizontal extensions of the structures could be precisely imaged. The ERT results successfully images most parts of the walls, pits and also smaller internal structures of the Roman building; moreover, excavation ditches that had been refilled prior to the ERT survey are delineated as resistivity heterogeneities as well.
The research aims to highlight the significance and composition and the diversity of meanings and the Quranic context in the necessary and transgressive verbs in Surat (Abs).
This research consists of : a preamble , and two studies . The researcher addressed in the preliminary the importance of the phenomenon of necessity and infringement, the signs of the necessary action , the structure and controls of the act , the methods of infringement , its sections and signs.
As for the first topic : The researcher addressed the necessary verbs in Surat Abs , an applied study in terms of grammati
... Show MoreThe dependence of the energy losses or the stopping power for the energies and the related penetrating factor are arrive by using a theoretical approximation models. in this work we reach a compatible agreement between our results and the corresponding experimental results.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show More
In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two. The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.
The guarantee of deposits came in most countries as a result of the financial crises faced by the banks, as the role of the guarantee agencies does not end to the point of enabling the depositor to recover his deposit, but rather it is considered necessary to overcome crises and stabilize the banking system.
The decisions related to the coverage determined by the types of guarantee are important, and it is required that these decisions be consistent with the policy of each guarantee to control and limit the negative effects that accompany deposit insurance, in order to face any risk that threatens deposits and confidence in them and to avoid any financial failures for the stability of the banking system and the protection of depo
... Show MoreThe diplomatic bag is one of the important means of communication used by the diplomatic mission to communicate with the government of the sending country and its consulates, as well as the missions in other countries. The diplomatic bag was granted absolute immunity against opening, seizing and inspection in order to effectively perform the function entrusted to it. The practical reality revealed the exploitation of the diplomatic bag to smuggle drugs and shipments of weapons and explosives that harmed the national security of the receiving country. The International Law Committee avoided the matter and reconciled the interest of the immunity of the diplomatic bag with the interest of the state in preserving national security and sovere
... Show MoreThe downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreThe state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of
... Show MoreOur aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule of an -module is called nearly primary-2-absorbing submodule if whenever , for , , , implies that either or or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.