The research aims to present a proposed strategy for the North Oil Company, and the proposed strategy took into account the surrounding environmental conditions and adopted in its formulation on the basis and scientific steps that are comprehensive and realistic, as it covered the main activities of the company (production and exploration activities, refining and refining activities, export and transport of oil, research and development activity, financial activity, information technology, human resources) and the (David) model has been adopted in the environmental analysis of the factors that have been diagnosed according to a thoughtful basis and with the participation of the company's experts and departments and after conducting a complete survey to explore the internal and external factors And build a swot matrix by assigning weight and significance to each factor. The Bryson model was also adopted in identifying strategic issues, and it is a suitable model for profit-seeking government institutions, and after analyzing internal and external factors (EFE, IFE), it emerged that the most appropriate strategy for the company is the growth and expansion strategy (strength - opportunities SO), and this strategy provides a good opportunity To achieve the company's goals for the next five years, and enhance the process of formulating sensitive strategic issues that are at the heart of the trend towards developing the company's work, as it included strategic issues, obstacles, time horizons, programs and procedures, and determining the entity of implementation and follow-up with evaluation criteria. The two researchers recommended the necessity of adopting this proposed strategic document, especially as it simulates the reality of the company and responds to the requirements of its role in supporting the national economy
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreRare earth metal oxides (REMOs) have gained considerable attention in recent years owing to their distinctive properties and potential applications in electronic devices and catalysts. Particularly, cerium dioxide (CeO2), also known as ceria, has emerged as an interesting material in a wide variety of industrial, technological, and medical applications. Ceria can be synthesized with various morphologies, including rods, cubes, wires, tubes, and spheres. This comprehensive review offers valuable perceptions into the crystal structure, fundamental properties, and reaction mechanisms that govern the well-established surface-assisted reactions over ceria. The activity, selectivity, and stability of ceria, either as a stand-alone catalyst or as
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreTo date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multip
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Hypothyroidism is the most prevalent thyroid disorders worldwide. Hypothyroidism manifestations are wide spectrum, affecting various systems in human body including the nervous system. Hypothyroidism can cause neuropsychiatric symptoms such as anxiety, depression and diminishing in attention, memory and executive function. Aim: to investigate the level of anxiety and depression in patients with hypothyroidism receiving levothyroxine treatment. Method: a cross-sectional study was conducted at Baghdad Center for Nuclear Medicine and Radiation Therapy from March to June 2022. The study population included patients of both genders, aged 18-65 years, diagnosed with hypothyroidism, were receiving levothyroxine treatment and
... Show MoreAs human societies grow, the problem of waste management becomes one of the pressing issues that need to be addressed. Recycling and reuse of waste are effective waste management measures that prevent pollution and conserve natural resources. In this study, the possibility of using glass waste as an alternative was used as a partial weight substitute for fine aggregates with replacement ratios of 10, 20, 30, and 40% by the weight, and formed into test models (15 cm * 15 cm ) cube and (15 cm * 30 cm) cylinder, then matured and tested their strength compression and tensile strength at the age of 7 and 28 days and compared with a reference or conventional concrete with a mixing ratio (1: 1.5: 3) as well as testing its worka
... Show MoreResearchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped