To study the striking perturbations of ionospheric Total Electron Content (TEC) before, during, and after the earthquake (M≥5) for earlier prediction to avoid calamities, ionospheric TEC data are taken by using red shift technique from two-frequencies GPS signals.. Tohoku earthquake on 11th March 2011 is chosen as case of our study (A magnitude M9.0 earthquake reported by the US Geological Survey gives its origin time at 05:46:23 UTC; the epicenter was located at 38.322oN, 142.369oE of the east coast of Honshu). The study was made 15 days before and 15 days after earthquake occurred over Japan at four different geographic positions, Kokubunji (35.7oN, 139.5oE), Wakkanai (45.2oN, 141.8oE), Yamagawa (31.2oN, 130.6oE) and Okinawa (26.7oN, 128.2oE). Observations TEC values compared with predicted TEC values by using the International Reference Ionosphere (IRI 2007) model to study the accuracy of model during the earthquake. Finally absolute error calculated between observed TEC (Obs.) values and predicted (Pre.) values before and after correction for 24 hours, which is reveals fewer errors after correction.
A total global dominator coloring of a graph is a proper vertex coloring of with respect to which every vertex in dominates a color class, not containing and does not dominate another color class. The minimum number of colors required in such a coloring of is called the total global dominator chromatic number, denoted by . In this paper, the total global dominator chromatic number of trees and unicyclic graphs are explored.
The aim of this study is to investigate the existence of some heavy metals (lead, cadmium, chromium) in colored plastic table dishes and study the migration of these metals to the food meals and the affecting factors in migration , such as storage period and food temperature. Six kinds of colored plastic table dishes were collected from Baghdad markets. The heavy metals in table dishes and in the prepared food meals put in them were estimated using atomic absorption spectrophotometer (Shimadzu A5000). The results indicated the existence of lead in all samples (1.61_1.00 mg/ kg) and chromium in three samples (0.85_0.97 mg/ kg) while other samples are free of chromium, and cadmium. Investigating the migration of these metals to food at dif
... Show MoreBackground: Laparoscopic cholecystectomy (LC) has become the standard treatment for symptomatic cholelithiasis. Bile duct injury and accidental gallbladder perforation with spillage of bile and stone are common complications of LC. This study was carried out to assess the early complications of gallbladder perforation during LC, and identify the risk factor of that perforation.
Objectives: to evaluate the early complications which may occur after the perforation of the gallbladder during laparoscopic cholecystectomy and to determine the risk factors which are associated with the perforation of the gall bladder.
Subjects and methods: A prospective comparative study o
... Show MoreImage retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud
... Show MoreNowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord
... Show MoreIn our normal life, we sometimes need a process of replacing something with another to get out of the stereotype. From this point of view, Mahmood’s attempted in the year 2020 to replace the content in the first main e-abacus diagram. He found the general rule for finding the value of the new partition after the replacement from the original partition. Here we raise the question: Can we find the appropriate mechanisms for the remainder of the main e-abacus diagram?
The research aims to reveal the recent trends used in providing information and to know the persuasive methods used in designing the content of the infographic as well as the nature of persuasive design methods and the topics presented by the infographic in the research sample. The researcher used the survey method, specifically the survey, by using the content analysis method to analyze the infographic material from the sample selected from the press and news sites that are the subject of the research, based on the method of what was said? How was it said? The researcher relied on the intentional sample, and this sample depends on the researcher selecting the vocabulary of the sample based on experiences and evaluating the c
... Show MoreAn image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show More