A cut-off low is a closed low with a low value of geopotential height at the upper atmospheric levels that has been fully detached (cut-off) from the westerly flow and move independently. A cut-off low causes extreme rainfall events in the mid-latitudes regions. The main aim of this paper is to investigate the cut-off low at 500 hPa over Iraq from a synoptic point of view and the behavior of geopotential height at 500 hPa. To examine the association of the cut-off low at 500 hPa with rainfall events across Iraq, two case studies of heavy rainfall events from different times were conducted. The results showed that the cut-off low at 500 hPa with a low value of geopotential height will strengthen the low-pressure system at the surface, leading to a case of atmospheric instability over Iraq and a significant amount of rain will fall if the moisture is available.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli
... Show More
Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.
Research depend on quantitative and descriptive method, It
... Show MoreBioavailability is the objective for an optimum formulation. The target of the analysis is to maximize both the fluidity and disintegration profile of class II weakly compounds that are water-soluble. Anti-dyslipidemia drug rosuvastatin calcium (RC) (bioavailability 20%) through formulating as nanofibers (NFs) using electrospinning (ES) technology. Twenty formulas were prepared, and different polymers and polymer combinations with various concentrations were used such as polyethylene oxide (PEO) polyvinyl pyrrolidine (PVPK-30), and hydroxypropyl methylcellulose (HPMC). Three distinct groups of maximum parameters, including polymeric solution, electrospinning method, and ambient parameter, are capable of influencing the creation alon
... Show MoreThe denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing. Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds. This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin
... Show MoreThe research deals with an important detail of the joints of the film industry and television drama, which is the expression and aesthetic of the long shot, after being popularized by some directors, and that the long shot has been employed since the beginning of the cinema. But the research addresses the contemporary film and how the long shot worked. The researcher identified her goal in identifying the aesthetic and expressive of the long shot in the contemporary film, and then defined the term of the shot and the long shot.
The theoretical framework was based on two topics: the first (aesthetic and artistic expression in cinema) and the second (the long shot and the state of its construction). The researcher then chose LA LA LAND
ZM Al-Bahrani, Medico Legal Update, 2021
In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More