A magnetotelluric investigation under the Williston Basin of southeastern Saskatchewan

1988 ◽  
Vol 25 (1) ◽  
pp. 60-67 ◽  
Author(s):  
J. M. Maidens ◽  
K. V. Paulson

A magnetotelluric (MT) survey using naturally occurring ultra low frequency (ULF) and extremely low frequency (ELF) sources was conducted in the frequency range of 0.5 mHz to 20 Hz in order to locate the western edge and the depth of the North American Central Plains (NACP) conductivity anomaly in the Bengough area of southeastern Saskatchewan. The data base was also used to evaluate the complex singular-value decomposition (CSVD) method of MT processing and to corroborate certain geologic interpretations in this part of the Williston Basin.Modelling of the resulting impedance tensors revealed a deep (10–15 km) zone with resistivity (35–85 Ω∙m) significantly lower than typical values (1000–1500 Ω∙m) obtained from a borehole resistivity log of the top 30 m of the Precambrian at a depth of 2.3 km. An increase in depth (to 20 km) and resistivity (150–275 Ω∙m) of this deep zone measured at the survey's west end was interpreted as indicating the anomaly's western edge. The CSVD processing of the data did not show any particular advantages over the conventional cross-spectral method.

2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Min Wang ◽  
Zhen Li ◽  
Xiangjun Duan ◽  
Wei Li

This paper proposes an image denoising method, using the wavelet transform and the singular value decomposition (SVD), with the enhancement of the directional features. First, use the single-level discrete 2D wavelet transform to decompose the noised image into the low-frequency image part and the high-frequency parts (the horizontal, vertical, and diagonal parts), with the edge extracted and retained to avoid edge loss. Then, use the SVD to filter the noise of the high-frequency parts with image rotations and the enhancement of the directional features: to filter the diagonal part, one needs first to rotate it 45 degrees and rotate it back after filtering. Finally, reconstruct the image from the low-frequency part and the filtered high-frequency parts by the inverse wavelet transform to get the final denoising image. Experiments show the effectiveness of this method, compared with relevant methods.


2014 ◽  
Vol 2014 ◽  
pp. 1-5
Author(s):  
Guohua Wang ◽  
Yufa Sun

A broadband radar cross section (RCS) calculation approach is proposed based on the characteristic basis function method (CBFM). In the proposed approach, the desired arbitrary frequency band is adaptively divided into multiple subband in consideration of the characteristic basis functions (CBFs) number, which can reduce the universal characteristic basis functions (UCBFs) numbers after singular value decomposition (SVD) procedure at lower subfrequency band. Then, the desired RCS data can be obtained by splicing the RCS data in each subfrequency band. Numerical results demonstrate that the proposed method achieve a high accuracy and efficiency over a wide frequency range.


2005 ◽  
Vol 42 (4) ◽  
pp. 457-478 ◽  
Author(s):  
Alan G Jones ◽  
Juanjo Ledo ◽  
Ian J Ferguson

Magnetotelluric studies of the Trans-Hudson orogen over the last two decades, prompted by the discovery of a significant conductivity anomaly beneath the North American Central Plains (NACP), from over 300 sites yield an extensive database for interrogation and enable three-dimensional information to be obtained about the geometry of the orogen from southern North Dakota to northern Saskatchewan. The NACP anomaly is remarkable in its continuity along strike, testimony to along-strike similarity of orogenic processes. Where bedrock is exposed, the anomaly can be associated with sulphides that were metamorphosed during subduction and compression and penetratively emplaced deep within the crust of the internides of the orogen to the boundary of the Hearne margin. A new result from this compilation is the discovery of an anomaly within the upper mantle beginning at depths of ~80–100 km. This lithospheric mantle conductor has electrical properties similar to those for the central Slave craton mantle conductor, which lies directly beneath the major diamond-producing Lac de Gras kimberlite field. While the Saskatchewan mantle conductor does not directly underlie the Fort à la Corne kimberlite, which is associated with the Sask craton, the spatial correspondence is close.


1975 ◽  
Vol 43 (3) ◽  
pp. 815-833 ◽  
Author(s):  
A. O. Alabi ◽  
P. A. Camfield ◽  
D. I. Gough

2020 ◽  
Vol 10 (8) ◽  
pp. 1785-1794 ◽  
Author(s):  
Liangliang Li ◽  
Yujuan Si ◽  
Linli Wang ◽  
Zhenhong Jia ◽  
Hongbing Ma

In this work, a novel image enhancement algorithm using NSST and SVD is proposed to improve the definition of the acquired brain images. The input brain image is computed by CLAHE, then the processed brain image and input brain image are decomposed into low- and high-frequency components by NSST, the singular value matrix of the low-frequency component is estimated. The final enhancement image is obtained by inverse NSST. Results of this experiment demonstrate that the proposed technique has good performance in terms of brain image enhancement when compared to other methods.


Author(s):  
Zhe Liu ◽  
Mee Loong Yang ◽  
Wei Qi Yan

In this chapter, the authors propose an improved image encryption algorithm based on digital watermarking. The algorithm combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) together in a DWT-DCT-SVD framework to improve the robust watermarking technique. The secret image is embedded into both high-frequency and low-frequency sub-bands of the host image; this makes it difficult to be attacked in all the sub-bands. To reduce the size of a secret key, the authors use a logistic map to generate random images so as to replace the host images. They tested the algorithm by using five types of attacks and the results indicate that the proposed algorithm has higher robustness than traditional chaotic scrambling method and the DRPE method. It shows strong resilience against the five types of attacks as well as statistical attacks.


Sign in / Sign up

Export Citation Format

Share Document