In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreHere, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
Background: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva
... Show MoreOur aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule of an -module is called nearly primary-2-absorbing submodule if whenever , for , , , implies that either or or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreThe focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.
The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show MoreLet R be commutative Ring , and let T be unitary left .In this paper ,WAPP-quasi prime submodules are introduced as new generalization of Weakly quasi prime submodules , where proper submodule C of an R-module T is called WAPP –quasi prime submodule of T, if whenever 0≠rstϵC, for r, s ϵR , t ϵT, implies that either r tϵ C +soc or s tϵC +soc .Many examples of characterizations and basic properties are given . Furthermore several characterizations of WAPP-quasi prime submodules in the class of multiplication modules are established.
In this article, unless otherwise established, all rings are commutative with identity and all modules are unitary left R-module. We offer this concept of WN-prime as new generalization of weakly prime submodules. Some basic properties of weakly nearly prime submodules are given. Many characterizations, examples of this concept are stablished.