The research aims to present a proposed strategy for the North Oil Company, and the proposed strategy took into account the surrounding environmental conditions and adopted in its formulation on the basis and scientific steps that are comprehensive and realistic, as it covered the main activities of the company (production and exploration activities, refining and refining activities, export and transport of oil, research and development activity, financial activity, information technology, human resources) and the (David) model has been adopted in the environmental analysis of the factors that have been diagnosed according to a thoughtful basis and with the participation of the company's experts and departments and after conducting a complete survey to explore the internal and external factors And build a swot matrix by assigning weight and significance to each factor. The Bryson model was also adopted in identifying strategic issues, and it is a suitable model for profit-seeking government institutions, and after analyzing internal and external factors (EFE, IFE), it emerged that the most appropriate strategy for the company is the growth and expansion strategy (strength - opportunities SO), and this strategy provides a good opportunity To achieve the company's goals for the next five years, and enhance the process of formulating sensitive strategic issues that are at the heart of the trend towards developing the company's work, as it included strategic issues, obstacles, time horizons, programs and procedures, and determining the entity of implementation and follow-up with evaluation criteria. The two researchers recommended the necessity of adopting this proposed strategic document, especially as it simulates the reality of the company and responds to the requirements of its role in supporting the national economy
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The aim of the study is to investigate the effects of space weather on the troposphere, where our climate exists. This work is useful to give us an idea of the interaction between solar activity and some meteorological parameters. The sunspot number (SSN) data were extracted from the World Data Center for the production, preservation, and dissemination of the international sunspot number (SILSO), top net solar radiation (TSR) and temperature 2 meters from the ERA5 model of the Copernicus Climate Change Service (C3S) from the Climate Data Store with 0.25 grid Resolution, providing a rich source of climate data for researchers. This study was conducted from 2008 to 2021 (solar cycle 24 and the beginning of 25) over Iraq loca
... Show MoreThe aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
The liver diseases can define as the tumor or disorder that can affect the liver and causes deformation in its shape. The early detection and diagnose of the tumor using CT medical images, helps the detector to specify the tumor perfectly. This search aims to detect and classify the liver tumor depending on the use of a computer (image processing and textural analysis) helps in getting an accurate diagnosis. The methods which are used in this search depend on creating a binary mask used to separate the liver from the origins of the other in the CT images. The threshold has been used as an early segmentation. A Process, the watershed process is used as a classification technique to isolate the tumor which is cancer and cyst.
 
... Show MoreThe encoding of long low density parity check (LDPC) codes presents a challenge compared to its decoding. The Quasi Cyclic (QC) LDPC codes offer the advantage for reducing the complexity for both encoding and decoding due to its QC structure. Most QC-LDPC codes have rank deficient parity matrix and this introduces extra complexity over the codes with full rank parity matrix. In this paper an encoding scheme of QC-LDPC codes is presented that is suitable for codes with full rank parity matrix and rank deficient parity matrx. The extra effort required by the codes with rank deficient parity matrix over the codes of full rank parity matrix is investigated.
In this paper, a new third kind Chebyshev wavelets operational matrix of derivative is presented, then the operational matrix of derivative is applied for solving optimal control problems using, third kind Chebyshev wavelets expansions. The proposed method consists of reducing the linear system of optimal control problem into a system of algebraic equations, by expanding the state variables, as a series in terms of third kind Chebyshev wavelets with unknown coefficients. Example to illustrate the effectiveness of the method has been presented.
Multivariate Non-Parametric control charts were used to monitoring the data that generated by using the simulation, whether they are within control limits or not. Since that non-parametric methods do not require any assumptions about the distribution of the data. This research aims to apply the multivariate non-parametric quality control methods, which are Multivariate Wilcoxon Signed-Rank ( ) , kernel principal component analysis (KPCA) and k-nearest neighbor ( −
We examine the integrability in terms of Painlevè analysis for several models of higher order nonlinear solitary wave equations which were recently derived by Christou. Our results point out that these equations do not possess Painlevè property and fail the Painlevè test for some special values of the coefficients; and that indicates a non-integrability criteria of the equations by means of the Painlevè integrability.
In this article, the notions are introduced by using soft ideal and soft semi-open sets, which are - - - -closed sets " -closed" where many of the properties of these sets are clarified. Some games by using soft- -semi, soft separation axioms: like ( 0 ( 0 Using many figures and proposition to study the relationships among these kinds of games with some examples are explained.
Group action on the projective space PG(3,q) is a method which can be used to construct some geometric objects for example cap. We constructed new caps in PG(3,13) of degrees 2, 3, 4, 7,14 and sizes 2, 4, 5, 7, 10, 14, 17, 20, 28, 34, 35, 68, 70, 85, 119, 140, 170, 238, 340, 476, 595, 1190. Then the incomplete caps are extended to complete caps.