يهدف البحث ابر تحديد نقاط الاختناق من خلال تحديد القيود التي تعترض عمل الشركة وبالتالي معالجتها من خلال تطبيق خطوات نظرية القيود والتي تمثل اداة فاعلة تساعد في التخلص من نقاط الاختناق وجدولة تلك القيود
The metric dimension and dominating set are the concept of graph theory that can be developed in terms of the concept and its application in graph operations. One of some concepts in graph theory that combine these two concepts is resolving dominating number. In this paper, the definition of resolving dominating number is presented again as the term dominant metric dimension. The aims of this paper are to find the dominant metric dimension of some special graphs and corona product graphs of the connected graphs and , for some special graphs . The dominant metric dimension of is denoted by and the dominant metric dimension of corona product graph G and H is denoted by .
In the domain of public law administration enjoys the privileges of public power, but it is in the field of administrative contracts is not free contract in any way you want, Valmushara intervenes to restrict the freedom of administration to follow a contracting methods set forth in, the most important of these methods is the public tender method, as a general principle of the contract, so Leaders are subject to a number of legal restrictions in the conclusion of their contracts do not meet like individuals in the conclusion of their contracts own, because they do not equated with individuals to freedom of expression of will to conclude contracts, and justification that the administration in its contract aims to achieve the public intere
... Show MoreCognitive mapping in humans is the process of coding, storing, and processing information that. Can be used in special behavior . Several scientific Domains interfere in the concept of cognitive maps including cognitive Psychology and environmental Psychology. Three papers at the start of the last century introduced the concept of cognitive maps , ( Gulliverʼs ,1908 ) brief note mentioned such maps in the context of teaching children orientation and there was a paper published by ( Hutorowicz , 1911 ) comprising an abridged translation of a monograph written by ( B .F .Adler ) o
... Show MoreThis paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.
According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability
p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive
preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the
average durations of the preventive and corrective maintenance actions a
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreEconomic organizations operate in a dynamic environment, which necessitates the use of quantitative techniques to make their decisions. Here, the role of forecasting production plans emerges. So, this study aims to the analysis of the results of applying forecasting methods to production plans for the past years, in the Diyala State Company for Electrical Industries.
The Diyala State Company for Electrical Industries was chosen as a field of research for its role in providing distinguished products as well as the development and growth of its products and quality, and because it produces many products, and the study period was limited to ten years, from 2010 to 2019. This study used the descriptive approa
... Show MoreThis study was conducted in order to statement the effect of ginger (Zingiber officinale) extracts in reducing the presence of the bacterium Salmonella typhimurium in some foods products.
Qualitative disclosures effective chemical compounds (alkaloids, flavonoids, phenols, tannins, terpenes) showed that the extracts of ginger an effective compounds as follows: oil extract and fresh juice> aqueous extract warm> aqueous extract cold. And studied the impact extract of fresh ginger juice, hot water ,cold water and oil rates extracts (1,2,3)% in bacteria test has shown that all s of extracts clear impact inhibition has oily extract of ginger recorded the highest value to inhibition zone reaching 35 mm when the concentration of 3%, f
The research aims to formulate a model for research on the dimensions of the Leader-member exchange theory according to the ideas and thoughts of Liden /Maslyn, Hammer and impact on job satisfaction and measure these dimensions at asiacell communications to identify the extent of convergence between theoretical dimensions share leader – member Exchange (LMX) with leadership style used in this company, we have been building scale contains two variables, independent variable Leader-member exchange theory five dimensions (effect , Loyalty, contribution, respect professional, and support) the certified job satisfaction variable dimensions (job security, The Style of management, organizational climate, appreciation, and work itself)
... Show More