Based economic units to technology to add innovations that lead to contribute to customer satisfaction, under intense competition and rapid development in customer taste, the economic units tend to apply the concepts that contribute to customer satisfaction led by the introduction of artificial intelligence techniques. In the production prominent role in the contributing and responding to the rapid changes in customer tastes, and consequent impact this in achieving customer satisfaction. Search gained importance of relying on artificial intelligence techniques to achieve customer satisfaction through speed of response to changes in the tastes of customers and thus be able to increase its market share، and sales growth، and to achieve all its objectives.
A representative sample of a thousand volunteer university students was screened for evidence of thalassemia minor.Complete blood counts using automated blood cell analysers and blood smears were examined. Patients having anemia, abnormal red cell indices or morphological features of thalassemia minor like hypochromia, microcytosis, target cells erythrocytosis and family history of thalassemia were then investigated for determination of HbA2 & HbF levels. Estimation of hemoglobin A2 was performed by micro-column chromatography while HbF was done using alkali denaturation. Seventy seven out of the thousand samples tested positive for thalassemia minor. They all showed a hemoglobin A
The study was conducted to estimate the economic losses caused by insect mole cricket Gryllotalpa gryllotalpa on some agricultural crops and Potato tubers in collage of Agriculture- Abu Ghraib season 2012-2013. Study showed Mole cricket caused percentage of infestation in spring potato tubers variety Luciana reached to 11.61% and the percentage of loss in weight of tubers reached 18.88%. The study showed that addition of animal manure (organic fertilizer) to the soil when planting potatoes in the autumn increased the incidence of infestation and the number of tunnels caused by mole cricket which led to from increased economic losses. When matured potato tubers were left for a longer period in the soil percentage of infestation by mole cr
... Show MoreAbstract:
Current research has sought to apply the criteria of potential for altmizalaorbi model EFQM 2013 in assessing the performance of the Inspector General's Office/Ministry of health, so as to keep up with a modern and advanced management methods in the evaluation of performance, as well as to link performance to a citizen's life, and it takes him beyond the accepted service capabilities today, but of budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and development, as well as the constant quest for continuous improvement, is the spirit of the principle underpinning the European Foundation Quality managemen
... Show MoreThe present analysis targets to recognize the influence of the separate teaching approach on the accomplishment of grammar for scholars of the College of Islamic Sciences. The target of attaining this target led the investigations developing the subsequent null theories: 1. No statistically substantial variance is happened at the consequence level of 0.05 between the mean scores of the scholars in the investigational category who learnt consistent with the separate learning approach and the mean scores of the scholars in the control category who learnt in the conventional method in the accomplishment test. 2. No statistically substantial variance has been observed at the consequence level of 0.05 in the mean differences between the
... Show MoreThe study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest
... Show MoreIn The Name of Allah Most Gracious Most Merciful
Scholars, past and present, have paid attention to the books of Fasting and Hajj, and they have compiled literature on that, and they have written treatises and researches. The best days, and as for the pilgrimage, it is one of the great pillars of Islam, which God Almighty has distinguished by making its rituals in the best of places, which is the Sacred House of God.
Theoretical and experimental investigations of free convection through a cubic cavity with sinusoidal heat flux at bottom wall, the top wall is exposed to an outside ambient while the other walls are adiabatic saturated in porous medium had been approved in the present work. The range of Rayleigh number was and Darcy number values were . The theoretical part involved a numerical solution while the experimental part included a set of tests carried out to study the free convection heat transfer in a porous media (glass beads) for sinusoidal heat flux boundary condition. The investigation enclosed values of Rayleigh number (5845.6, 8801, 9456, 15034, 19188 and 22148) and angles of inclinations (0, 15, 30, 45 and 60 degree). The numerical an
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More