In this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases; a circle and an ellipse, and all figures and obtained rigour measurements are checked by AutoCAD program. With its simple, symmetric form, the future predictions are tuned for the Noor's curve to be usefully engaged in important practical applications.
The research is aimed at investigating how the New York Times framed the war against ISIS in its news coverage and which news sources it adopted while reporting on this war.
The research could be classified under descriptive researches. The survey methodology has been adopted and the content analysis has been used. The research sample consists of all the news stories the New York Times have published about the war against ISIS from 10/17/2016 to 4/16/2017 according to the comprehensive sampling method. The number of news stories that were analyzed was (155) news story. The research tool was (coding scheme).
The research has reached the following conclusions:
1. In its news coverage of the war against ISIS, the New York T
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreOut of 150 clinical samples, 50 isolates of Klebsiella pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 25 (50%) of isolates were resistant to gentamicin (≥16µg/ml), 22 (44%) of isolates were resistant to amikacin (≥64 µg/ml), 21 (42%) of isolates were resistant to ertapenem (≥8 µg/ml), 18 (36%) of isolates were resistant to imipenem (4- ≥16µg/ml), 43 (86%) of isolates were resistant to ceftriaxone (4- ≥64 µg/ml), 42 (84%) of isolates were resistant to ceftazidime (1
... Show MoreThis growing interest of the international scientific specialized commissions is due to the role that the audit committee can play, as one of companies’ governance tools, to increase the accuracy and transparency of the financial information disclosed by the companies, through its oversight role on the process of preparing financial reports, its supervision on the internal audit function within the companies, and supporting its independency, as well as coordinating the efforts between the internal control unites and the external auditor represented by the (Board of Supreme Audit) to clear the observations and irregularities in order to reduce the fraud cases.
This research was built on an applied sample of audit committee works
... Show MoreBased on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.
The research aims to shed light on the role of artificial intelligence in achieving Ambidexterity performance, as banks work to take advantage of modern technologies, artificial intelligence is an innovation that is expected to have a long-term impact, as well as banks can improve the quality of their services and analyze data to ensure that customers' future needs are understood. . The Bank of Baghdad and the Middle East Bank were chosen as a community for the study because they had a role in the economic development of the country as well as their active role in the banking market. A sample of department managers was highlighted in collecting data and extracting results based on the checklist, which is the main tool for the stu
... Show More