The aim of the research is to identify both the re-engineering of management processes and the strategic decision-making process in the research community and determine the nature of the correlation between the two variables and know the relationship between them to achieve the research goal. The researcher used a descriptive and analytical method. The research community consists of a group of professors and staff of the College of Education affiliated to the University of Mustansiriya in Baghdad, which their number were (45), the researcher has distributed the forms to all members of the sample, only (3) forms were excluded for invalidity and thus the number of forms approved in the analysis were (42) forms. The rese
... Show MoreThis research is studying technique sculptures super - realism, search through, how the method of work, and the search for the materials used in their manufacture, and this is the first study in the field of art and the field of academic study in the country.Research consists of an introduction, And four sections, The introduction containing information on: research problem, Importance of research, Goals of the research, Limits of research, research approach, and research tools.The first section contains a technical study sculptures super -realism in contemporary sculpture, while the second section includes a search for alternative materials available in the local markets, for making sculptures super - realism, the third section dedicate
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreAddressed this research the impact of intelligence emotional dimensions of the main(self awareness, and self-management, and social awareness, and relationship management) in the performance excellence the university(performance optimization, and strategic development) this is by middling the styles decision making which are (rational and intuitive, and dependent, and spontaneous, and avoidant), and Go search of an intellectual dilemma raise fundamental questions revolve around the search was to answer those questions through a theoretical framework for search variables first and test models of the relationship and second through the impact six hypotheses President.The objective of the research to make sure the contr
... Show MoreSurface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch. The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreClassification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show More