Preferred Language
Articles
/
jeasiq-1182
Use the Six Sigma technique in a solutionProblems of work (analytical study)
...Show More Authors

The research Concentrates on modern Variable in the organizations that is 6 sigma. The field study is two of Iraqi industrial organizations, The first is state company of …………… , the other is the state company of ……

The problem of the research determines some questions and hypotheses, The data was Collected by question air, which contains 5 dimensions and (10) critical Successful factories  . 

The sample contains (42) who Works in that organizations. The points out many conclusions. The main of it, there is significant differences among the two organizations Then The research concluded with a number of important recommendations serve it's objectives .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Ndt & E International
Porosity evaluation of in-service thermal barrier coated turbine blades using a microwave nondestructive technique
...Show More Authors

View Publication
Scopus (20)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE SOCIAL INTERACTION OF LANGUAGE IN A COMIC SERIES: A SOCIOLINGUISTIC STUDY
...Show More Authors

Dell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo

... Show More
View Publication
Publication Date
Thu Aug 16 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Social Interaction of Langauge in a Comic Series: A Sociolinguistic Study
...Show More Authors

DBNRAHA Hameed, IJRSSH PUBLICATION, 2018

View Publication
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Psychological stress in unemployed individuals and its association with well being
...Show More Authors

The aim of this study is to detect the level of psychological stress among unemployed individuals and the level of their wellbeing by finding the correlation between these two variables.

          The research sample consisted of (99) people who are currently unemployed and registered at the Ministry of Labor Affairs.

Schafer (1996) scale for psychological stress was used and alongside Ziout's (2012) scale for wellbeing.

          The results of the research showed an inverse relation between being unemployed and having wellbeing.

 &nb

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Red Tapes and their Reflections on Entrepreneurial Orientation: an Exploratory Study of a Sample of Employees in Some Organizations in the Province of Ninewah
...Show More Authors

Organizations adopt a number of procedures and instructions in their field of activities in order to aid their resources development   and energies to serve their entrepreneurial orientations. This calls for preparing a range of mechanisms to mitigate the strictness and complexity of procedures. The ambiguity and severe  complexity  of procedures means acknowledging the loss in energy and this in turn  impedes the hopes while in the same time weakens the  enthusiasm in these organizations and an impedes the possibility to achieve continues innovation, thereby losing opportunities to the level of surrender to the risks and  assuming them to be unconquered obstacles.

There

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Statistical Sciences
Use the robust RFCH method with a polychoric correlation matrix in structural equation modeling When you are ordinal data
...Show More Authors

View Publication
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref