An experiment was carried out evaluate the performance of RAU combined equipment under three levels of practical speed, (V1) 4.06 km. h-1, (V2) 4.43 km. hr-1 and (V3) 5.76 km. hr-1, and three levels of depth with 10,20and 30 cm. It is denoted by D1, D2, D3 respectively. A split plot design was used within the RCBD design with three replications. The experiment results showed that the first practical speed 4.06 km.hr-1 achieved the lowest slippage percentage from 9.61%, lowest traction power 14.65hp, lowest soil penetration resistance to1.34 kg.cm-2, and the highest total operating costs (40803.4 ID.ha-1, while the third speed achieved the opposite results. The first treatment depth achieved the lowest results for slippage percentage 8.52%, traction power 15.34hp, soil penetration resistance 1.17 kg. cm-2, and total operating costs 37215.0ID. ha-1, while the third depth achieved the opposite results. Interaction between treatment depth and practical speed showed that the first treatment depth with the first practical speed has the lowest average of slippage percentage 7.63%, the lowest value of the traction power 13.77 hp, and the lowest average of soil resistance to penetration 1.03 kg.cm-2, while the first treatment depth and third practical speed has lowest average of the operating costs 34533.4 ID.ha-1.
Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t
... Show MoreAbstract
The Research Includes Two Variables : First , Academic Accreditation with his dimensions ( Educational Context , Educational Inputs , Educational Process , Educational Outputs , Feedback ) , And The Second : Strategic Performance With His dimensions ( Financing , Satisfaction Stakeholders , Internal Processes , Learning And Growth ) , The Research Highlights On The Academic Accreditation System Which Is Considered A Major And Important Systems Can Through Which Administration Of Activities And Programs Institutions Of Higher Education , As This research aims to determine his relationship And The Extent Of Its Effect In The Strategic Performance , And It Includes The Research C
... Show MoreIn the petroleum industry, multiphase flow dynamics within the tubing string have gained significant attention due to associated challenges. Accurately predicting pressure drops and wellbore pressures is crucial for the effective modeling of vertical lift performance (VLP). This study focuses on predicting the multiphase flow behavior in four wells located in the Faihaa oil field in southern Iraq, utilizing PIPESIM software. The process of selecting the most appropriate multiphase correlation was performed by utilizing production test data to construct a comprehensive survey data catalog. Subsequently, the results were compared with the correlations available within the PIPESIM software. The outcomes reveal that the Hagedorn and Brown (H
... Show Morecharacteristic tissues and cells, exerting their pharmacological aspects and alleviating a lot of diseased processes. Accordingly, this research is about introducing some isatins to be nucleophilically attacked at C3 forming products of azomethine ylide functionality. These iminium compounds were made by allowing certain isatins to be reacted with the secondary amino acid, proline, at acetic acid and methanol medium and then collected after purification to be identified with total Leukocyte count (TLC) and melting point. The structural characterization was performed by fourier-transform infrared spectroscopy (FTIR), proton nuclear magnetic resonance (1H-NMR), and community health nursing (CHN) analysis. The microbiological evaluatio
... Show MoreEvaluating the part of historical center in Baghdad City
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreObjectives: This Paper is an attempt to evaluate the services provided by the private hospitals
and to identify the strength and weakness in
their performance The results can be utilized in stating conclusion and recommendations to improve
and activate the role of private medical sector in society .
Methodology: A questionnaire has be designed for this purpose and distributed to ( 132 ) beneficiaries
mostly from Baghdad private hospitals .
Results: The paper has come out with many important results . Among These are the following :
* these who benefit from services provided by private hospitals believe that the good performance of
such hospital is not due to the medical services alone but also to scientific aspect
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show More