Use Almtafr Alcderan orange, one of the factors Hashr Alttafaria to study Alatjabh isolates elected on the basis of specifications so that was a positive response with mutagen record and system consisting of three isolates used Alcderan orange graded concentrations and under specific Trov similar conditions Alttafar Pal NTG compared
This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri
HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
Require senior management of the state when developing the strategy the general budget to the clarity of the reasons that are based upon the ministries in the preparation of estimates of expenditure for the next year to justify the spending, and in the absence of targets, the ministry or government unit would not be in front, but be guided by the size of expenditure for the last year in addition to the percentage of represented an increase of appropriations required for the next year in light of the fiscal policy of the state, so the requested increase in appropriations to meet the desired increase in some of its activities and to meet the increase in salaries and prices. So must be available to the Ministry of criteria that coul
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn this study, the performance of the adaptive optics (AO) system was analyzed through a numerical computer simulation implemented in MATLAB. Making a phase screen involved turning computer-generated random numbers into two-dimensional arrays of phase values on a sample point grid with matching statistics. Von Karman turbulence was created depending on the power spectral density. Several simulated point spread functions (PSFs) and modulation transfer functions (MTFs) for different values of the Fried coherent diameter (ro) were used to show how rough the atmosphere was. To evaluate the effectiveness of the optical system (telescope), the Strehl ratio (S) was computed. The compensation procedure for an AO syst
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
The research studied and analyzed the hybrid parallel-series systems of asymmetrical components by applying different experiments of simulations used to estimate the reliability function of those systems through the use of the maximum likelihood method as well as the Bayes standard method via both symmetrical and asymmetrical loss functions following Rayleigh distribution and Informative Prior distribution. The simulation experiments included different sizes of samples and default parameters which were then compared with one another depending on Square Error averages. Following that was the application of Bayes standard method by the Entropy Loss function that proved successful throughout the experimental side in finding the reliability fun
... Show More