This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
This study aims to highlight the role of strategic leadership in adopting the intelligent organization model. The study was conducted on 7 economic organizations in Algeria. The study population consisted of 354 leaders, of whom a random sample of 176 leaders (managers, department heads, division heads, engineers) was selected. The researcher used a questionnaire as the main tool of the study. Statistical analysis and hypothesis testing were conducted using SEM (Structural Equation Modeling) with the aid of SPSS.v26 and AMOS.v24 software. The study concluded with a set of results, most notably: there is a statistically significant direct positive effect between strategic leadership and building intelligent organizations at a significance le
... Show MoreOvako Working Postures Analyzing System (OWAS) is a widely used method for studying awkward working postures in workplaces. This study with OWAS, analyzed working postures for manual material handling of laminations at stacking workstation for water pump assembly line in Electrical Industrial Company (EICO) / Baghdad. A computer program, WinOWAS, was used for the study. In real life workstation was found that more than 26% of the working postures observed were classified as either AC2 (slightly harmful), AC3 (distinctly harmful). Postures that needed to be corrected soon (AC3) and corresponding tasks, were identified. The most stressful tasks observed were grasping, handling, and positioning of the laminations from workers. The construct
... Show MoreIn this study, we investigate about the run length properties of cumulative sum (Cusum) and The exponentially weighted moving average (EWMA) control charts, to detect positive shifts in the mean of the process for the poisson distribution with unknown mean. We used markov chain approach to compute the average and the standard deviation for run length for Cusum and EWMA control charts, when the variable under control follows poisson distribution. Also, we used the Cusum and the EWMA control charts for monitoring a process mean when the observations (products are selected from Al_Mamun Factory ) are identically and independently distributed (iid) from poisson distribution i
... Show MoreActivated carbon prepared from date stones by chemical activation with ferric chloride (FAC) was used an adsorbent to remove phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) from aqueous solutions. The influence of process variables represented by solution pH value (2-12), adsorbent to adsorbate weight ratio (0.2-1.8), and contact time (30-150 min) on removal percentage and adsorbed amount of Ph and PNPh onto FAC was studied. For PNPh adsorption,( 97.43 %) maximum removal percentage and (48.71 mg/g) adsorbed amount was achieved at (5) solution pH,( 1) adsorbent to adsorbate weight ratio, and (90 min) contact time. While for Ph adsorption, at (4) solution pH, (1.4) absorbent to adsorbate weight ratio, and (120 min) contact
... Show MoreSummary: The study focused on the role of the educational counselor in schools, as an integral part of the educational system that faces multiple challenges and difficulties. In this context, the counselor’s role becomes crucial in attempting to reduce or eliminate such difficulties, in addition to guiding students in an appropriate manner. Methodes: The study employed a descriptive field approach, using interviews and direct observation as tools to examine the actual role performed by school counselors. Results: The study concluded with several key findings, most notably the numerous challenges faced by counselors, including students’ negative behaviors, school dropouts, and the limited administrative support for counselors’ work. Fu
... Show MoreA condense study was done to compare between the ordinary estimators. In particular the maximum likelihood estimator and the robust estimator, to estimate the parameters of the mixed model of order one, namely ARMA(1,1) model.
Simulation study was done for a varieties the model. using: small, moderate and large sample sizes, were some new results were obtained. MAPE was used as a statistical criterion for comparison.
One of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.
The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.
For data compression, where one is trying to find compact transform representations for a
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show More