The study focused on the identification of the natural relation between the organizational components, and the most important is the organizational structure, which not hid its effect on each function and operation of the organizational structure through commanding the individual craters and its forms according to the requirement of these function, also it has relation with an organic synthesis that between the dimensions of the organic synthesis and the practice side in the commission of Integrity.
The problem of the research pensioned in some questions about hypothesis and theoretical parts, in which they go a mention about the hypothesis questions is to use all the knowledge's in this atmosphere and th
... Show MoreSet dietary program for some of dietary supplements and training for badminton young players, and identifying effect of taking some of the dietary supplementary for badminton young players. The research population :( badminton young players group (Arminian club). For age group (16-18) years the sample is divided in to two experimental groups within each group (6) players, and two for the exploratory experiment which was within the research sample, they were divided in to two groups, the first group take some of the dietary supplements (multivitamin creating) .the set exercises by the researchers in the main part of the training unit and the second group (amino acids, vitamins) and the set exercises by the researcher. The scientific approach
... Show MoreIn this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%
... Show MoreSpecimens of the sesarmid crab Nanonsesarma sarii (Naderloo and Türkay 2009) were collected from the intertidal zone of Khor Al-Zubair, Basrah, Iraq 2012 far from the Arabian Gulf coasts. Morphological features of this species are highlighted and a figure is provided.
Abstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More
The aim of this study was to isolate and identify the cyanobacterium Scytonema hofmanni Var. calcicolum from the domestic drinking tanks as a new record in Iraqi drinking water. Scytonema hofmanni var. calcicolum, a filamentous freshwater cyanobacterium (blue-green alga). This alga was isolated from the walls of the domestic plastic water tanks in Al- karkh/ Baghdad city on July 2014. The sampling was performed by collecting three samples from this tanks, the three examined samples microscopically revealed the dominance of this cyanobacterium as unialgal in the studied samples. The results showed this alga has the ability to tolerate high temperature up to 42 Cº and very low light intensity inside the tanks which up to 10 μE/m²/s.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More