A cut-off low is a closed low with a low value of geopotential height at the upper atmospheric levels that has been fully detached (cut-off) from the westerly flow and move independently. A cut-off low causes extreme rainfall events in the mid-latitudes regions. The main aim of this paper is to investigate the cut-off low at 500 hPa over Iraq from a synoptic point of view and the behavior of geopotential height at 500 hPa. To examine the association of the cut-off low at 500 hPa with rainfall events across Iraq, two case studies of heavy rainfall events from different times were conducted. The results showed that the cut-off low at 500 hPa with a low value of geopotential height will strengthen the low-pressure system at the surface, leading to a case of atmospheric instability over Iraq and a significant amount of rain will fall if the moisture is available.
The poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreThe topic of supra.topological.spaces considered one of the important topics because it is a generalization to topological.spaces. Many researchers have presented generalizations to supra open sets such as supra semi.open and supra pre.open sets and others. In this paper, the concept of δ∼open sets was employed and introduced in to the concept of supra topology and a new type of open set was extracted, which was named S∼δ∼open. Our research entails the utilization of this category of sets to form a new concepts in these spaces, namely S∼δ∼limit points and S∼δ∼derive points, and examining its relationship with S∼open and S∼reg∼open. Based on this class of sets, we have introduced other new concepts such as S∼isolate
... Show MoreA total of four types of instant dry yeast
A comprehensive review focuses on 3D network-on-chip (NoC) simulators and plugins while paying attention to the 2D simulators as the baseline is presented. Discussions include the programming languages, installation configuration, platforms and operating systems for the respective simulators. In addition, the simulator’s properties and plugins for design metrics evaluations are addressed. This review is intended for the early career researchers starting in 3D NoC, offering selection guidelines on the right tools for the targeted NoC architecture, design, and requirements.
Background: This study aims to determine whether cigarette smoking and anxiety degrees are related among nurses. Methods: A correlation design study was conducted at Baquba Teaching Hospital in Diyala Governorate, and the study period extended from September 10th, 2023, to January 28th, 2024. A nonprobability purposive sample was used to include 200 nurses working at Baquba Teaching Hospital, Iraq. Data were collected using a self-administered questionnaire from January 10th to February 7th, 2024. There were two components to the study instruments. Initially, the demographic sheet contained the individuals' sociodemographic data. The Taylor manifest anxiety scale is included in the second section. The collected data were analyzed us
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreCoumarin derivatives have shown different biological activities, such as antifungal, antibacterial antiinflammatory, and antioxidant activities, besides antibiotic resistance modulating effects, and anti-HIV, hepatoprotective, and antitumor effect. So, new coumarin derivatives (hydrazones and an amide) were synthesized through multisteps reactions. All the synthesized target compounds were characterized by FT-IR spectroscopy, 1HNMR analysis. The compounds then evaluated for their anti-bacterial activity by means of well-diffusion method against two gram-positive bacteria (Staphylococcus aureus, Streptococcus pneumoniae) and two gram-negative bacteria (E.coli and Pseudomonas aeruginosa). The highest activity was demonstr
... Show MoreGraphic design art depends on changeable cognitive systems which their relation and items relying on the accumulation of humane knowledge and thong and the humane look to the venality and his explanation to the relation between him and the venality , then the graphic design art becomes an important item of this accumulation knowledge besides , it is on kind of knowledge kinds . The technological advancement in communication lauds to increasing in communication media and design methods , where the computer and its application in graphic design promotes the design process because of it's capalebities which lead to in creasing in production process , minimizing the cost and time and achieving creative and aesthetic aspect because of it's fe
... Show MoreThe architecture of the richly decorated mosques demonstrated that the Islamic culture is one of the most significant and greatest civilizations in the history of humanity. The plant decorative units are one of the key areas in which the Muslim artist excelled. As a result, he created various plant forms that he took from nature, which led him to invent the arabesque art consisting of plant motifs with curved and rounded lines or wrapped between them. These shapes with curved borders include leaves, twigs, and flowers. Buildings and artefacts from the nineteenth century AD have this shape. they achieved their objectives during the twelfth and thirteenth centuries. There was another kind of vegetable decorative unit, made up of stems and
... Show More