In this work, animal bones with different shapes and sizes were used to study the characteristics of the ground penetrating Radar system wares reflected by these bones. These bones were buried underground in different depths and surrounding media. The resulting data showed that the detection of buried bones with the GPR technology is highly dependent upon the surrounding media that the bones were buried in. Humidity is the main source of signal loss in such application because humidity results in low signal-to-noise ratio which leads to inability to distinguish between the signal reflected by bones from that reflected by the dopes in the media such as rock .
The contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreThe method of heavy metals deposition which is based on cobalt in detection of Carbonic anhydrase enzyme in the Sulcus median in the hid brain (fourth ventricle) in the adult white rat (Rutts rutts). An essential amended in the method has been done by using cobalt chloride (CoCl2) instead of cobalt phosphate (Co3(PO4)2) in the reaction medium. Any efficacy of enzymic histochemical for carbonic anhydrase enzyme did not show in histological sections. The floor of the fourth ventricle of the brain is specific, clearly any histochemical reaction sediments have not been found in sulcus median of the floor of the fourth ventricle. The corresponding stain to green methyl which was observed clearly in sulcus median region. The ventral surface of
... Show MoreIn this study we surveyed the dominant normal stool flora of randomly selected healthy, young (18-23 years old), unmarried (doctrinal) Iraqi college students (males and females) for the carriage of extraintestinal pathogenic E. coli (ExPEC). ExPEC virulence was detected phenotypically by mannose resistant hemagglutination of human red blood cells (MRHA) and mannose sensitive (MS) agglutination of Bakers' yeast (Saccharomyces cerevisceae). From 88 college students, 264 E. coli isolates were obtained (3 isolates per person): 123 from 41 females and 141 from 47 males. Of these isolates, 56% (149/264) caused MS agglutination of yeast cells and 4.16% (11/264) showed MRHA. Eighty two percent (9/11) of the isolates with MRHA also caused MS agglu
... Show MoreThis article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreActual and effective organizational dynamic capabilities in the work environment contribute to a number of factors that contribute to the organization's ability to manage its human talents. Thus, the study sought to identify the level of contribution of organizational dynamic capabilities to human talent management based on their dimensions in the investigated organization by determining the level of relationship and impact between these variables. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate sample of (42) administrative leaders in the investigated organization and adopte
... Show MoreThe recognition of the dynamic organizational capabilities in their actual and influential extent in the work environment achieves a set of positive data that can fall under the addition axes, particularly with regard to the organization's ability to manage human talents in them, so the researchers sought to identify the level of contribution of dynamic organizational capabilities in the management of human talents in terms of Keep them away in the research organization by indicating the level of relationship and impact between them. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate
... Show More