The research aims to investigate the relationship and impact of e-governance as an independent variable in achieving creative performance as a dependent variable. These variables have been studied in the Directorate of Passports Affairs, and seek to come up with a set of recommendations that help in promoting e-governance in the researched organization, and the researcher adopted the descriptive-analytical approach, included The sample (122) of the total (194) individuals distributed in several administrative levels (officers, associates, and administrative staff). By adopting the questionnaire, which included (49) paragraphs as the main tool for the collection of data and information, as well as personal interviews and field observations as a tool to collect them, and for the processing of data and information, the research adopted the program (SPSS V., 24 & AMOS V., 24), the main conclusions The hypotheses have been demonstrated by the importance of the Directorate of Passport Affairs for its creative performance due to its interest in e-governance, especially through possessing the capabilities and human resources, and supporting it in monitoring and evaluation tools, adherence to standards and applications, and managing its financial resources and technology infrastructure.
In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
The research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ
... Show MoreIn the present work, the feasibility of formation near-ideal ohmic behavior of In/n-Si contact efficiently by 300 s duration Nd:YAG pulsed laser processing has been recognized. Several laser pulses energy densities have been used, and the optimal energy density that gives best results is obtained. Topography of the irradiated region was extensively discussed and supported with micrographic illustrations to determine the surface condition that can play the important role in the ohmic contact quality. I-V characteristics in the forward and reverse bias and barrier height measurements have been studied for different irradiated samples to determine the laser energy density that gives best ohmic behavior. Comparing the current results with
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables