The subject of the listen to the voice of the customer of topics relatively new in management thought, as it won the attention of many organizations of different types, because it is important to achieve success and to continue and superiority to them, so there is a need to study this term in the Iraqi organizations and try to diagnose the implementation of the study sample to listen voice of the Customer and its
... Show MoreAccording to the current situation of peroxidase (POD), the relevant studies on this enzyme indicated its importance as a tool in clinical biochemistry and different industrial fields. Most of these studies used the fruits and vegetables as source of this enzyme. So that in order to couple the growing requirements for POD with the recent demands for reduc-ing disposal volume by recycling the plant waste, the aim of the present study was to extract POD through management of municipal bio-waste of Iraqi maize species. A simple, green and economical method was used to extract this enzyme. Our results revealed that maize cobs are rich sources of POD, where the activity of this enzyme was found to be 7035.54 U/g of cobs. In pilot experiments thi
... Show MorePilot-scale dead end microfiltration membranes were carried out to determine the feasibility of the process for treating the oily wastewater which discharge from some Iraqi factories such as power station of south of Baghdad and the general company of petrochemical industries. Polypropylene membranes (cylindrical shape) with different pore diameters (1 and 5 micron) were used to conduct the study on micromembrane process. The variables studied are oil concentration (100 – 1000 ppm), feed flow rate (20 – 40 l/h), operating temperature (31 – 50°C) and time (0 – 3 h). It was found that the flux increases with increasing feed flow rate, temperature and pore size of membrane, and decreases with increasing oil concentration and operating
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAutonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreIn this study, we fabricated nanofiltration membranes using the electrospinning technique, employing pure PAN and a mixed matrix of PAN/HPMC. The PAN nanofibrous membranes with a concentration of 13wt% were prepared and blended with different concentrations of HPMC in the solvent N, N-Dimethylformamide (DMF). We conducted a comprehensive analysis of these membranes' surface morphology, chemical composition, wettability, and porosity and compared the results. The findings indicated that the inclusion of HPMC in the PAN membranes led to a reduction in surface porosity and fiber size. The contact angle decreased, indicating increased surface hydrophilicity, which can enhance flux and reduce fouling tendencies. Subsequently, we evaluated the e
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show More
The current study is concerned over the benefits from our Prophet ' Surah , these benefits are seven which are : the first : ( The losing , disappointment , weakness in the affairs of those disbelievers ,the second : showing the affairs of the believers in respect to integrity , forgiveness and rest, the third : Indicating the big difference between the believers and disbelievers , each team has his own characteristics that being distinguished from the other, I have explained the benefit that the disbelievers are in a difficult
... Show More