A new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.
Landforms on the earth surface are so expensive to map or monitor. Remote Sensing observations from space platforms provide a synoptic view of terrain on images. Satellite multispectral data have an advantage in that the image data in various bands can be subjected to digital enhancement techniques for highlighting contrasts in objects for improving image interpretability. Geomorphological mapping involves the partitioning of the terrain into conceptual spatial entities based upon criteria. This paper illustrates how geomorphometry and mapping approaches can be used to produce geomorphological information related to the land surface, landforms and geomorphic systems. Remote Sensing application at Razzaza–Habbaria area southwest of Razz
... Show MoreDeep Learning Techniques For Skull Stripping of Brain MR Images
Background Microorganisms and fungal growth especially Candida albicans, on soft denture lining material are the most common problem which can lead to chronic mucosal inflammation. The aim of this study was to evaluate the effect of zirconium nanoparticles into acrylic-based heat cured soft denture lining material against Candida albicans, and the amount of zirconium ion release of soft liner/ZrNPs composite. Furthermore, evaluate shear bond strength after ZrNPs addition to soft liner. Materials and methods: Zirconium nanoparticles were added into acrylic-based soft denture liner in various percentages (1%, and 1.5% by weight). Two hundred and fifty specimens were arranged and isolated into four groups as per the test to be done The antifu
... Show MoreThis paper deals with the subject of demarcating as appropriate scientific techniques to rationalize consumption and to control segments of the society for the technical conduct of its handling of the product depending on the mix of elements (product and the volume of demand, Price, promotion and distribution), but inverse manner designed to adjust the working condition of balance between supply and demand and to ensure that rates continue in the marketing process properly, and therefore the research aims to shed light on some of the practices that reflect the Demarketing techniques, As well as the statement of the reality of attitudes towards the practice of those techniques through a sample survey of officials in Baghdad company for so
... Show MoreInfertility can be detected when the couples have not completed pregnancy after a year or more of normal coitus. So, in order to treat infertility, there are many supported reproductive techniques are in practice. The success rate of these techniques depends upon the way by which preparation of the paternal semen sample. Over the past 30 years, the manual has been standard as providing global standards and has been used extensively by research and clinical laboratories throughout the world. The spermatozoa of all placental (eutherian) mammals, including humans, are in a protective, no labile formal at ejaculation and are incapable of fertilization even if they are placed in direct contact with an oocyte. Accordingly, they must undergo a sub
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MorePrecision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreThe rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimiz
... Show More