Become organizations today can not withstand the competitive challenges and constant change in the business environment , as well as the pressures witnessed by the Iraqi environment , especially in recent years such as the opening of the market which increased ambitious organizations and desire to secure the experiences superior to the survival and expansion of the competitive environment , prompting attention to the subject of vital contemporary is emotional Marketing and measure its impact on the customer experience in the sector of the economy is important and is the financial sector , so there is a need to study this term in the Iraqi organizations and try to diagnose the extent of implementation of the study sample emotional marketing and its impact on the customer experience, and have been chosen Altaif company for convertible financial application of the study data was collected from ( 60 )staff member of the front line and sections and divisions of the company, and used the checklist as an essential tool for the collection of data , The study found a set of conclusions and recommendations , including the possession of the company researched integrated database private customers make it easier for the customer conversion processes conversion processes subsequent information about the customer and thus did not need to bring the archives tariff and probative and limited to the PIN number for each customer , which in turn contains its own data , but it should be on the company surveyed to take a broad interest to customers across their views, and the degree of satisfaction with the services provided and to provide a mechanism to respond to the requirements that have been monitored
Three-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc
... Show MoreComposite materials are widely used in the engineered assets as aerospace structures, marine and air navigation owing to their high strength/weight ratios. Detection and identification of damage in the composite structures are considered as an important part of monitoring and repairing of structural systems during the service to avoid instantaneous failure. Effective cost and reliability are essential during the process of detecting. The Lamb wave method is an effective and sensitive technique to tiny damage and can be applied for structural health monitoring using low energy sensors; it can provide good information about the condition of the structure during its operation by analyzing the propagation of the wave in the
... Show MoreWhile conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).
Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this
Two series of 1,3,4-oxadiazole derivatives at the sixth position of the 2,4-di-
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MorePseudomonas aeruginosa is common gram negative rod – shaped bacterium, a species of considerable medical importance, P. aeruginosa is prototypical "multi drug resistant (MDR) Pathogen" that is recognised for its ubiquity, its intrinsically advanced antibiotic resistance mechanisms, and its associatation with serious illnesses – especially nosocomial infection such as ventilator – associated pneumonia and various sepsis syndromes. This study was conducted from March 2014 to July 2014, the patients were males and females. Total samples of 613 patients, selected from burns wards and general surgery wards, the samples were sending to teaching laboratories from the same hospital. The present study
... Show MoreKarbala province regarded one part significant zones in Iraq and considered an economic resource of vegetation such as trees of fruits, sieve and other vegetation. This research aimed to utilize Normalized Difference Vegetation index (NDVI) and Subtracted (NDVI) for investigating the current vegetation cover at last four decay. The Normalized Difference Vegetation Index (NDVI) is the most extensively used satellite index of vegetation health and density. The primary goals of this research are gather a gathering of studied area (Karbala province) satellite images in sequence time for a similar region, these image captured by Landsat (TM 1985, TM 1995, ETM+ 2005 and Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such gap filli
... Show More