A multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates it's capability of preserving the statistical characteristics of the observed series. The preservation was checked by using (t-test) and (F-test) for the monthly means and variances which gives 98.6% success for means and 81% success for variances. Moreover for the same data two well-known models were used for the sake of comparison with the developed model. The single-site singlevariable auto regressive first order and the multi-variable single-site models. The results of the three models were compared using (Akike test) which indicates that the developed model is more successful ,since it gave minimum (AIC) value for Sulaimania rainfall, Darbandikhan rainfall, and Darbandikhan evaporation, while Matalas model gave minimum (AIC) value for Sulaimania evaporation and Dokan rainfall, and Markov AR (1) model gave minimum (AIC) value for only Dokan evaporation).However, for these last cases the (AIC) given by the developed model is slightly greater than the minimum corresponding value.
Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreReceipt date:6/3/2021 acceptance date:4/5/2021 Publication date:31/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The research in the role of variables contact for non-state actors have become more influential in the current of contemporary events, that related with the reality of seeking services and providing all of that in favor of maintaining the social peace, and ensuring its empowerment in order to make peace and stability outcomes as a real fa
... Show MoreThe rubber ropes exercises affected muscle groups, which in turn affects the corners of the conditions of the body before and over the barrier where affected the time passed. To change the angle of the approaching and payment impact on passing each times the barrier 1-5. That passed over the barrier 1and gate 5 impacts on the nature of the achievement, where time has become less. Find the values of cruise missiles and other phases and stages of pitch angle other categories which it enshrines stood as compelling rejection men's 110m hurdles. Find the value of the instant messaging distances between different barriers and stages. Studies by adding rubber sling barriers race categories, measurement of kinematic variables. Emphasis on the devel
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreThe theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
The orbital masses are one of these morphines and functional components that achieve function
The Togolese