The study is dealing with an application reengineering process clean solar cells in the Ministry of electricity, as aimed at the possibility of the applicability and impact of re-engineering to achieve the level of performance of the Ministry's operations, with the application of the cleaning process solar cells, developed, improved and found a correlation, statistically significant effect between variable re-engineering and performance as well as the application of process reengineering clean solar cells:1- Before the re-engineering process the total time for cleaning up and solar cell 20 minutes and number of columns performed per day 24 columns and total columns750 which were completed per month that reached 7,500,000 dinar monthly as a total cost. 2- Before the re-engineering process the total time for cleaning up and solar cell 6 minutes and number of columns performed per day 80 columns and total columns2400 which were completed per month that reached 750,000 dinar monthly as a total cost. The most important recommendations of the Ministry of electricity must adopt a reengineering process to address all the problems confronting them by forming teams, training and development of employees to access the best ways to improve operations.
The organization and development of the irrigation system and agrarian reform in Iraq had an impact on the diversity of its methods and uses
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem. The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.
Charge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More
Leuconostoc bacteria was isolated from local pickled cabbage (Brassica oleracea capitata) and identified as Leuconostoc mesenteroides by morphology,biochemical and physiological. The local isolated L. mesenteroides bacteria under the optimal conditions of dextran production showed that, the highly production of dextran was 7.7g achieved by using a modified natural media comprised of 100ml whey, 10g refined sugar, 0.5g heated yeast extract, 0.01g CaCl2, 0.001g MgSO4, 0.001g MnCl2 and 0.001g NaCl at pH 6 and 25̊C for 24 hr of fermentation and by using 1ᵡ106 cell/ml as initial inoculums volume. Some applications in food technology (Ice cream, Loaf, Ketchup and Beef preservation) have been performed with processed dextran. The result
تناول المقال موضوع استثمار الذكاء الاصطناعي في تحليل البيانات الضخمة داخل المؤسسات العلمية، وركز على توضيح أهمية هذا التكامل في تعزيز الأداء الأكاديمي والبحثي. استعرضت المقالة تعريفات كل من الذكاء الاصطناعي والبيانات الضخمة، وأنواع البيانات داخل المؤسسات العلمية، ثم بينت أبرز التطبيقات العملية مثل التنبؤ بأداء الطلبة، والإرشاد الذكي، وتحليل سلوك المستخدمين، والفهرسة التلقائية. كما ناقشت المقالة التحدي
... Show Moreتولي المجتمعات المتقدمة اجتماعياً واقتصاديا وثقافيا وعلميا اهتماما بارزا للعنصر البشري واستثماره على أفضل صورة ممكنة لتحقيق التقدم والرفاهية لتلك المجتمعات وللأفراد على حد سواء , وتحتل تنمية الثروة العقلية واستثمارها محل الصدارة حيث يبذل اهتمام خاص للكشف عن المواهب والكفاءات المبدعة وتنميتها وتوجيهها ورعايتها علميا وتربويا ومهنيا وذلك لان العنصر البشري يعد جزءا لا يتجزأ من الثروة القومية للأمة حيث
... Show Moreأن للتطرف العنيف أسباب متنوعة تقف وراء ظهوره وتمدده في دول العالم المختلفة على نطاق واسع، إذ إن لكل بيئة ظروفها وخصوصياتها الكلية والفرعية التي تسهم في تعزيز القدرة التأثيرية للسلوكيات العنفية في إطار مجتمع ما، لاسيما إذا علمنا إن التطرف العنيف المؤدي الى الإرهاب كسلوكيات عنفية متطرفة مدمرة للبناء المجتمعي ما كان ليستمر لولا وجود بيئة حاضنة وظروف تساعد في انتشاره واستمرارية قدراته التأثيرية في البناء السي
... Show More