هدف البحث الى بيان طبيعة ارتباط والتأثير بين الضغوط التنافسية (المتغير المستقل) والتجديد الاستراتيجي (المتغير التابع) ، تم تطبيق البحث في فنادق الدرجة الممتازة في بغداد. وبلغت عدد افراد عينة البحث (99) مديراً يعملون في (6) فنادق من الدرجة (الممتازة) ببغداد، وهي (فندق الرشيد، فندق عشتار، فندق ميريديان، فندق المنصور، فندق بابل، وفندق بغداد) وتم اجراء التحليل الاحصائي باستخدام البرنامج الاحصائي AMOS وظهرت وجود تنافسية عالية بشأن الخدمة التي تقدمها الفنادق من وجهة نظر المبحوثين ، وهناك ارتباط وتأثير للضغوط تنافسية في التجديد الاستراتيجي ، وان يولي المديرين اهتماماً استثنائياً بموضوعات (الضغوط التنافسية والتجديد الاستراتيجي) وينبغي تضمينها في توجهاتهم الاستراتيجية ، و وكانت الاستبانة هي الاداة الرئيسة لجمع البيانات من المستجيبين، توصل البحث الى عدد من النتائج ، من ابرز النتائج وجود علاقة ارتباط ذات دلالة احصائية معنوية بين الضغوط التنافسية والتجديد الاستراتيجي ، فضلا عن وجود تأثير للضغوط التنافسية في التجديد الاستراتيجي على المستوى الكلي وعلى مستوى الابعاد الفرعية
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
After receipt of military commanders power in 1980, they were determined to solve the
Kurdish question by force, just like their predecessors in resolving such issues, and the
situation became worse when the Kurdish resistance in a more organized than previous years
and behind the Party (PKK) .
After the mass support of the Kurdish widespread party get involved most of the Kurdish
youth in the party organization of the (PKK), prompting Turkish President then to make
decisions and take immediate action firm against the party, but the Kurdish issue began
Tthlhal when he arrived at the helm of President Turgut Ozal in 1989, he worked on the
development of the areas inhabited by the Kurds, specifically the Southeast A
This research presents a comparison of performance between recycled single stage and double stage hydrocyclones in separating water from water/kerosene emulsion. The comparison included several factors such as: inlet flow rate (3,5,7,9, and 11 L/min), water feed concentration (5% and 15% by volume), and split ratio (0.1 and 0.9). The comparison extended to include the recycle operation; once and twice recycles. The results showed that increasing flow rate as well as the split ratio enhancing the separation efficiency for the two modes of operation. On the contrary, reducing the feed concentration gave high efficiencies for the modes. The operation with two cycles was more efficient than one cycle. The maximum obtained effici
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreInvestigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data
CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.