Abstract
The research hypothesizes is that the external Environment
has the responsibility concerning decisions making and behavioral
upon industrial firms. It is, Furthermore, an attempt to review the
problem of closures of private industrial firms in the country, during
the period (1976-1985), i.e. prior to and during the Iraqian- Iranian
war.
The behavioral approach of industrial geography has been
adopted as a theoretical background and the statistical test has
been practiced for the applied purposes.
As result, the research comes out with suggestions,
depending upon previous trials in the field of direction and
formulation of the of the private industrial sector. The chief point
among th
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values
The current research aims at identifying the new marketing directions that in the picture because if the changes and challenges that face the business nowadays, these effect on the future of the new product.
The problem of the research concentrate on the new marketing activities and how to make it appropriate between the product and the market's need, and to fulfill the needs and desire of the customer and it's importance for achieving the economical goals of the organization for a long relationship with the customer.
The resume of the research is about the impact of nowadays marketing and it's effect on knowing the customer instead of concentrating on the important roll of mark
... Show MoreThe research discusses with organizational spirituality and its implications on the organizational performance in the General Company for Food Industries in Abu Ghraib (Baghdad). The aim of the research was to determine the contribution of organizational spirituality in the organizational performance of the surveyed company. In order to achieve the objectives of the research، two main hypotheses were adopted. Several sub-hypotheses centered on the relationship between organizational spirituality and organizational performance in terms of its dimensions (Meaning work، self-esteem، community affiliation،
... Show MoreEarth dams are constructed mainly from soil. A homogenous earth dam is composed of only one material. The seepage through such dams is quite high. Upstream impervious blanket is one of the methods used to control seepage through the dam foundations. Bennet's method is one of the commonly used methods to design an impervious upstream blanket. Design charts are developed relating the length of blanket, total reservoir head, total base width of the dam (excluding downstream drainage), the coefficient of permeability of the blanket material, blanket thickness, foundation thickness, and coefficient of permeability of the foundation soil, based on the equations governing the Bennet's method for a homogenous earth dam with a blanket of uniform
... Show MoreTwo molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standar
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More