The Research dealt with the role of the target costs in reducing the cost of products in the General Company for soft drinks. One the modern approaches reduce costs and thus increase the ability and continuity to compete in the market. Where the problem of research in identifying the shortcomings in the traditional method used in the company sample research. Which led to a weak control of the cost and the researcher relied on data and costs of the company. The research recommended that the target cost of the company should be applied to the research sample. Training the employees. In addition, preparing training courses for them. He stressed the need to address obstacles that prevent the existence of an effective cost system. Including the application of the target cost method in the research sample company
Carbon nanotubes were prepared by an arc-discharge method,
under different values of pressure of oxygen gas. The structure of
multi-walled carbon nanotubes powders has been characterized by
low-angle X-ray diffraction .The morphology of carbon nanotube
powder was examined by transmission electron microscope. The
capacitance-voltage and current- voltage (dark and illumination
current) characterization were measured under different values of
pressure (10-3, 10-4, 10-5) mbar of oxygen gas
A linear and nonlinear theoretical and experimental aeroelastic investigation of a wing-flap-tab typical section model undergoing two-dimensional incompressible airflow is described. The linear flutter velocity (LFV) and frequency are predicted using linear analysis. Then a freeplay structural nonlinearity is considered in the tab. The structural equations of motion have been coupled with Theodorsen aerodynamic theory to produce the theoretical aeroelastic model which is analyzed by a state space method to predict the LFV and flutter frequency. Linear piecewise function has been used to introduce the tab spring stiffness in the freeplay state. The ground vibration test is used to measure the model structural dynamic characteristics. Then th
... Show MoreConcentrations of radon were measured in this study for twenty-four samples of soil distributed in six locations on the north part of Iraq. The radon concentrations in soil samples measured by using alpha-emitters registration that emits from Radon (222Rn) in (CR-39) track detector. The concentrations values were calculated by a comparison with standard samples. The results shows that the radon gas concentrations in Darbandikhan City varies from (16.60-34.04 Bq/m3), Halabja City (16.51-23.32 Bq/m3), Al Sulaimaniya City (17.61-32.25 Bq/m3), Koisnjaq City (22.04-35.65 Bq/m3), Shaqlaua City (21.10-29.10 Bq/m3) and Erbil City (22.30-34.63 Bq/m3). The average radon gas concentration in Al Sulaimaniya and Erbil governorate are (22.30 Bq/m3)
... Show MoreIn this study tungsten oxide and graphene oxide (GO-WO2.89) were successfully combined using the ultra-sonication method and embedded with polyphenylsulfone (PPSU) to prepare novel low-fouling membranes for ultrafiltration applications. The properties of the modified membranes and performance were investigated using Fourier-transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), contact angle (CA), water permeation flux, and bovine serum albumin (BSA) rejection. It was found that the modified PPSU membrane fabricated from 0.1 wt.% of GO-WO2.89 possessed the best characteristics, with a 40.82° contact angle and 92.94% porosity. The permeation flux of the best membrane was the highest. The pure water permeation f
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More