Preferred Language
Articles
/
jeasiq-2095
The role of corporate merger in achieving synergy (Analytical research in a sample of companies of the Iraqi Ministry of Industry and Minerals)
...Show More Authors

The research aims to shed light on the recent experience in the Iraqi business environment, which is the experience of the merger. To evaluate a recent experience in an important sector of the Iraqi business sectors, namely the industrial sector to enable decision-makers to review that experience to judge the extent of its success and address some of the lapses that experience that by measuring synergies can be judged on the success of the merger experience or not. The research community is the governmental industrial sector. The research sample included six cases of merger (14) companies before the merger. The Holt method was used to predict the net sales and total cost values ​​before the merger as if it were not merged. The researcher reached a number of conclusions, the most important of which is that the merger achieved cost synergies for all cases of merger, and other conclusions were achieved synergistic net sales of part of the merger cases such as the General Company for Steel Industries and the General Company for Food Industries Companies that did not achieve consistency in net sales, as well as there are points of failure in the merger of the General Company for Electrical Industries, the General Company for Metallurgical Industries, the General Company for Design and Execution of Projects and the General Electronic Systems Company for not achieving synergies at the level of net sales

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
Takagi–Sugeno Fuzzy Modeling and Control for Effective Robotic Manipulator Motion
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Karbala International Journal Of Modern Science
Performance Estimation and System Modeling for Refractive Index Structure Constant Cn2
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Parabola Dish and Cassegrain Concentrators to Improve Solar Cell Conversion Efficiency
...Show More Authors

New designs of solar using ray tracing program, have been presented for improved the performance and the out put power of the silicon solar cell, as well as reducing the cost of system working by solar energy. Two dimensional solar concentrator (Fresnel lenses) and three dimensional concentrators (parabola dish and cassegrain) were used as concentrator for photovoltaic applications (CPV). The results show that the performance efficiency and out power for crystalline silicon solar cells are improved.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 11 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Dental caries and salivary physiochemical characteristics among osteoporotic old adult women
...Show More Authors

Background: Osteoporosis is a systemic skeletal disorder affects general health in addition to effect on salivary physical and chemical composition which lead to an adverse effect on oral health status. This study was conducted to evaluate the concentration of glycoprotein (osteonectin) in saliva and its effect on dental caries in relation to salivary flow rate and viscosity among osteoporotic women and compared to control group. Materials and Methods: The total sample composed of 60 females aged 60-65 years attending Al-Yarmook Teaching Hospital, 30 females diagnosed with osteoporosis by measuring bone density at the spine and femur with a dual-energy X-ray absorptiometry at T-score of >2.5, and 30 women without osteoporosis with T-score o

... Show More
View Publication Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More