This research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).
The field of graphic design has witnessed a unique, unique form transformed in its construction and installation and superior to systems through its creation of foundational data for design ideas with functional aesthetics and utilitarianism and effective and moving formulation in light of modern trends and what globalization has brought about in terms of openness to the outside world and the processes of communication and communication with the international community through graphic design. Based on the above, this study marked (Aesthetics of the Design Idea and its Communication Role in the Graphic Outcome) comes to clarify the topic through three chapters, including the first chapter, which was devoted to the research methodology, th
... Show MoreSMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreRepresent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreThe purpose of this study was to evaluate the epidemiological characteristics of the mandibular fractures relating to gender, age, the etiology of injury, and the rendered treatment modalities and complications. The data of the patients who sustained mandibular fractures were retrieved and were analyzed retrospectively, and based on these data a descriptive analysis was conducted. A total of 112 patients were included in this study; the most common cause was road traffic accidents (RTAs) followed by assaults and missile injuries. The most frequently involved age group was 11 to 20 years, treatment modalities included conservative, closed reduction and indirect fixation, and open reduction and internal fixation (ORIF) in 11.6, 79.5, and 8.9%
... Show More