In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.
This research includes the using of statistical to improve the quality of can plastics which is produced at the state company for Vegetable oils (Almaamon factory ) by using the percentage defective control chart ( p-chart ) of a fixed sample. A sample of size (450) cans daily for (30) days was selected to determine the rejected product . Operations research with a (win QSB ) package for ( p-chart ) was used to determine test quality level required for product specification to justify that the process that is statistically controlled.
The results show high degree of accuracy by using the program and the mathematical operations (primary and secondary ) which used to draw the control limits charts and to reject the statistically uncontr
Contemporary developments in various sciences and the impact of technological changes require an integrated vision of the activities and work of the organization in Iraq in light of the high costs of products and their low quality compared to imported products of high quality and low cost, and the need to use modern cost techniques based on a clear and specific philosophy that contributes to increasing the efficiency and effectiveness of management In the business environment and how it can contribute to reducing product costs and being environmentally friendly at the same time, it is no secret that the main goal of most organizations is to maximize profitability and reduce costs to the minimum, but this matter is not achieved autom
... Show MoreAbstract
This research aims to assess and measure the quality of health services provided by the Baghdad Educational Hospital using five dimensions of 5Qs , Developer model by (Zinelidin), 2006), the problem of the research is to try to determine the quality of health services provided at the hospital as well as the investigation of the existence of the elements of quality contribute to achieve the requirements of customers and their needs, and used for the purposes of this research two approaches, first used Applied Research to 5Qs dimension model and use the Checklist as a Key tool to collection and analysis of data and the second descriptive analytical me
... Show MoreThe current research aims to evaluate the appraisal form for Arabic language teachers in light of comprehensive quality standards by designing standards for the competencies of primary school teacher in accordance with comprehensive quality requirements. The researcher adopted the descriptive approach. The research community included the Arabic language supervisors in the Education Directorates of Diyala Provincial and Baghdad. The research sample consisted of (14) supervisors from the Diyala Provincial Department of Education and the First Rusafa Education Directorate in Baghdad Governorate by (8) supervisors and (6) Supervisors respectively specializing in Arabic language. As for the research tool, questionnaire prepared by the researc
... Show MoreBackground: Fixed orthodontic appliances impede the maintenance of oral hygiene and result in plaque accumulation leads to enamel demineralization caused by acids produced by bacteria. Studies on plaque control strategies in orthodontic populations are limited. This might be caused by difficulties in the quantitative evaluation of dental plaque because the teeth have various levels of bracket coverage, and different tooth sizes and malocclusions, making the traditional categorical indices complex. The present study aims to evaluate the effect of different hygiene protocols on plaque quantity on bands with different attachments. Materials and method: Twenty patients had four bands within the orthodontic appliance. Then randomly divided into
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThe purpose of this research is to identify the youth issues in Talk Shows in the Iraqi satellite channels via monitoring a sample of episodes of the Talk Shows episodes which are concerned and analyzed the youth issues in the Iraqi satellite channels, namely, «Hala Shabab Program» at Al-Iraqia satellite Channel and «Shabab wa Banat Program» at Al-Sumaria satellite Channel by recording and re-watching them again. This research is classified as one of descriptive researches. The survey method was adopted in this study.
For this purpose, the researcher prepared an analysis form. The researcher de
... Show More