Polyaniline polymer has been prepared by chemical oxidation
polymerization method in laboratory successfully. The PANI and
(PVA+PVP) as a polymer blends in different percentage (30%, 50%,
70%) from Polyaniline was prepared. The sample was studies as
optical properties by UV-vis spectrophotometer at (400-700) nm.
The result of optical energy gap was 2.23 eV for pure (PVA+ PVP)
and with additive was increasing with increasing PANI concentration
to become (2.49 for 30% to 2.52 for 70%) PANI. The goal of this
project is prepare triple blend polymer and study the effect when add
conductive polymer (Polyaniline) on the optical properties and
calculate optical constant as energy gap, refractive index, dielectric
constant and dielectric losses for (PVA+PVP) blends.
The aim of this research is to apply Throughput Accounting in improving the cost leadership strategy for the woven fabric department (polyester blended - polyester 150/1) in the Waist Textile and Knitting Factory. The problem of the research is that the research sample laboratory does not apply modern cost management methods represented in Throughput Accounting, as the Iraqi economic units suffer from their inability to compete in the labor market in light of the competitive environment. The Ministry of Interior improved the cost leadership strategy for the product of blended polyester and polyester fabrics 1/150. Through the research, a set of conclusions was reached, the most important of which are: Improving the cost lea
... Show More(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)
Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi
... Show MoreCoronavirus disease 2019 (COVID-19) is a flu-like infection caused by a novel virus known as Severe Acute Respiratory Syndrome coronavirus 2 (SARS-CoV-2). After the widespread around the world, it was announced by the World Health Organization (WHO) as a global pandemic. The symptoms of COVID-19 may arise within 2 weeks and the severity ranged from mild with signs of respiratory infection to severe cases of organ failure and even death. Management of COVID-19 patients includes supportive treatment and pharmacological medications expected to be effective with no definitive cure of the disease. The aims of this study are highlighting the management protocol and supportive therapy especially vitamin D and manifesting the clinical symptoms b
... Show MoreThis research aims to study to the strategic management of organizational conflict, which included (concept of conflict and development, types Altzimi conflict, ,management strategies organizational conflict) and its impact on job performance, which included( the concept of performance, elements functionality,) As well as the impact of the conflict on job performance has been selected Rashad training Hospital affiliated to the Department of Health in Baghdad's Rusafa, as the most important service hospitals with the exact specialty in psychiatry and its impact on the lives of citizens and how to enable the hospital aware of the strategic management of organizational conflict raises the level of functionality provided and make the
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe financial analysis of the published financial statements is the means that enables businessmen, financial institutions, financial analysts and others to conduct their studies and conclusions to obtain information that helps them in the decision-making process, including decisions related to investment. National in making the decision on the investment activity, for the period from 2012 to 2018, through the information provided by the annual financial statements, by selecting a set of indicators provided by the financial statements, namely (liquidity ratio, activity percentage, profitability ratios) to measure the extent of this ability Indicators in determining their role in making an investment decision.
The research aims to identify the factors that affect the quality of the product by using the Failure Mode and Effect Analysis (FMEA) tool and to suggest measures to reduce the deviations or defects in the production process. I used the case study approach to reach its goals, and the air filter product line was chosen in the air filters factory of Al-Zawraa General Company. The research sample was due to the emergence of many defects of different impact and the continuing demand for the product. I collected data and information from the factory records for two years (2018-2019) and used a scheme Pareto Fishbone Diagram as well as an FMEA tool to analyze data and generate results.
Par
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More