A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization techniques than the conventional tabular data format. To achieve the main objective of this research, two study areas have been chosen: the old constructionbridge (Al-Qadisiyah bridge) and the newly constructed bridge (Barboty bridge). Both of them are in Al-Muthanna city \ Iraq. The data collection process was achieved in two stages: the first stage is providing a georeferenced satellite image for each study area for the purpose of producing a two-dimensional map. The second stage includes the field surveying process by total station and level instruments. GIS have been used to create a comprehensive database (Geodatabase) for both study areas. Geostatistical analysis was carried out in which the settlement areas of both study areas were defined by producing a colour image. The statistical tables for these analyses showed that the highest decline in the elevation reached at Al-Qadisiyah bridge to 19 mm in the middle of the bridge which is coloured as a red areas. On the other hand, it was found that the highest decline in the elevation of the Barboty bridge is 16 mm in the last part of steel space which is also coloured as a red areas.
The present research aims to identify and define the basic dimensions of the information management strategy and the administrative creativity in the Faculty of Management and Economics / the University of Kirkuk, as well as the role played by the dimensions of the information technology management strategy in achieving the administrative innovation in the college and the research problem was formulated in several questions. The research problem was formulated in several questions centered on the correlation between the research variables, and the research was based on a major hypothesis and five sub-hypotheses emerged from which it was subjected to several tests to ensure its validity. The researcher used the descriptive-analyti
... Show MoreThis research aims to identify and measure the role of TQM in the process of developing the financial performance of Diyala State Company and show the reality and obstacles, after applying the company's management to the requirements of ISO 9001: 2008 and compare it with its performance before applying this standard, The researcher measured the financial performance by conducting financial analysis of the financial statements and conducting a number of interviews at the company's headquarters, Diyala State Company (one of the Iraqi Ministry of Industry and Minerals formations) was sele
... Show MoreThe telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce
... Show MoreIn this paper, an experimental study of the thermal performance for hybrid solar air conditioning system was carried out, to investigate system suitability for the hot climate in Iraq. The system consists of vapor compression unit combined with evacuated tube solar collector and liquid storage tank. A three-way valve was installed after the compressor to control the direction flow of the refrigerant, either to the storage tank or directly to the condenser. The performance parameters were collected by data logger to display and record in the computer by using LabVIEW software. The results show that the average coefficient of performance of hybrid solar air conditioning system (R=1) was about 2.42 to 2.77 and the average p
... Show MoreThis study aims to design unified electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed the acceptable limit of being absent, and by that we can replace the traditional way of using papers to count absence, with a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.
In order to achieve the study's objectives, we designed an information syst
... Show MoreIn Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More