The expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of many sorting methods in a variety of ways using MPICH.NT.1.2.3 library under C++ programming language and comparisons between the parallel and sequential implementations are presented. Then, these methods are used in the image processing field. It have been built a median filter based on these submitted algorithms. As the parallel platform is unavailable, the time is computed in terms of a number of computations steps and communications steps
This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of r
... Show MoreIn this study, two active galaxies (NGC4725, NGC4639) have been chosen to study their morphological and photometric properties, by using the IRAF ISOPHOTE ELLIPS task with griz-filters. Observations are obtained from the Sloan Digital Sky Survey (SDSS) which reaches now to the DATA Release (DR14). The data reduction of all images (bias and flat field) has been done by SDSS Pipeline. The surface photometric investigation was performed like the magnitude. Together with isophotal contour maps, surface brightness profiles and a bulge/disk decomposition of the images of the galaxies, although the disk position angle, ellipticity, and inclination of the galaxies have been done. Also, the color of galaxies was studied, where chromatic distribution
... Show MoreThe activation and reaction energies of the C-C and C-H bonds cleavage in pyrene molecule are calculated applying the Density Functional Theory and 6-311G Gaussian basis. Different values for the energies result for the different bonds, depending on the location of the bond and the structure of the corresponding transition states. The C-C bond cleavage reactions include H atom migration, in many cases, leading to the formation of CH2 groups and H-C≡C- acetylenic fragments. The activation energy values of the C-C reactions are greater than 190.00 kcal/mol for all bonds, those for the C-H bonds are greater than 160.00 kcal/mol. The reaction energy values for the C-C bonds range between 56.497 to 191.503 kcal/mol. As for the C-H cleavage rea
... Show MoreThe Research deals with the negative phenomena which appeared in the urban scenes of the Iraqi cities after 2003, particularly trespassing the architectural design of the urban Individual houses. Many academic researchers , critics, and cultural circles, drawn attention to the impact of political and cultural variable change on such phenomena without detailed analysis . The research problem is set according to central questions : If the phenomena is the trespass , what
are the sides which are being trespassed in the division of the individual house? , If the diagnosis of the phenomena denotes perceived repetition of the cases , So what's size of this transposes on the architectural design of t
Background: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The concept of education is not actually restricted to children or school students, but rather every person should be educated and followed up if he is intended to grow and prove, with effort and time allocation as to fulfill that goal. Thus , the current paper aims to a thinking education and to educate that thinking in teacher and it is not new to deal with the personal characteristics of teacher in the different scientific , and educational researches . But ,these research did not address the necessity of acquiring the skill of thinking, especially as it affects teacher's presentation of the content of the curriculum or even content outside the curriculum, and therefore, there is n
... Show MoreThe present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreThe need to create the optimal water quality management process has motivated researchers to pursue prediction modeling development. One of the widely important forecasting models is the sessional autoregressive integrated moving average (SARIMA) model. In the present study, a SARIMA model was developed in R software to fit a time series data of monthly fluoride content collected from six stations on Tigris River for the period from 2004 to 2014. The adequate SARIMA model that has the least Akaike's information criterion (AIC) and mean squared error (MSE) was found to be SARIMA (2, 0, 0) (0,1,1). The model parameters were identified and diagnosed to derive the forecasting equations at each selected location. The correlat
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More