Accelerates operating managements in the facilities contemporary business environment toward redefining processes and strategies that you need to perform tasks of guaranteeing them continue in an environment performance dominated by economic globalization and the circumstances of uncertainty attempt the creation of a new structure through multiple pages seek to improve profitability and sustainable growth in performance in a climatefocuses on the development of institutional processes, reduce costs and achieve customer satisfaction to meet their demands and expectations are constantly changing. The research was presented structural matrix performance combines methodology Alsigma in order to improve customer satisfaction significantly between Technology performance balanced with a view to achieving the goals of the business financial and non-financial cross-axes multi for continuous improvement and strengthening of management responsibility and encourage the participation of human resources in achieving measurements of performance objectives.The research found that guided the elements and principles of the matrix of the performance of the Six Sigma related leadership and profitability, management and optimization, sales and distribution, service and growth, human resources and innovation, operational excellence and management of procurement and suppliers will enable the administration to achieve improvement and profitability and processes within the business all the efficiency, effectiveness and economic.
The research deals with the formal characteristics of folklore in contemporary Iraqi ceramics as a comparative study between the two potters Siham Al-Saudi and Sajida Al-Mashayikhi.
The research consists of four chapters. The first chapter is concerned with the research problem, the importance, the objectives, and the limits of the research, while the aim of the research answers the following question: The method and mechanisms of employing the traditional elements and vocabulary in the products of the potters “Seham Al-Saudi and Sajida Al-Mashaikhi”.
The second chapter came in the theoretical framework of the investigations and includes: The first topic: The second topic the movement in shaping contemporary Iraqi ceramics, whi
Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper reports experimental and computational fluid dynamics (CFD) modelling studies to investigate the effect of the swirl intensity on the heat transfer characteristics of conventional and swirl impingement air jets at a constant nozzle-to-plate distance ( L = 2 D). The experiments were performed using classical twisted tape inserts in a nozzle jet with three twist ratios ( y = 2.93, 3.91, and 4.89) and Reynolds numbers that varied from 4000 to 16000. The results indicate that the radial uniformity of Nusselt number (Nu) of swirl impingement air jets (SIJ) depended on the values of the swirl intensity and the air Reynolds number. The results also revealed that the SIJ that was fitted with an insert of y = 4.89, which correspo
... Show MorePhotos of the backwardness of the Muslims and their backwardness in creating
sustainable development policies have driven them to a state of civilization , which witnesses
Avckaddoha time ago and not disrupt the adversary is a phenomenon thought the youth to
exercise its role and duty in the construction and development of the state witnesses Mdanah
civilized nation.
The vigilance thought the youth of its slumber correct form could provide opportunities for
growth and development in the Arab and Islamic worlds, and both material and moral support
through the creation model youth Islamic social role models, but that the image of the model
, , - 1
Objectives: To assess nurses-midwives knowledge and performance regarding immediate newborn care in delivery rooms, and to identify the relationship between nurses-midwives knowledge and performance and their socio-demographic and professional variables regarding immediate newborn care.
Methodology: A descriptive study was conducted from 1st of October, 2019 to 20TH of October, 2020 at three maternity teaching hospitals in Baghdad city/Al-Russafa Health Directorate: Al-Elwiya Maternity Teaching Hospital, Fatema Al- Zahra Maternity and Pediatric Hospital, Al- Za'faraniyah General Hospital. Non-probability (purposive sample) include
... Show MoreThe ring modulator described in part I of this paper is designed here for two operating wavelengths 1550nm and 1310nm. For each wavelength, three structures are designed corresponding to three values of polymer slot widths (40, 50 and 60nm). The performance of these modulators are simulated using COMSOL software (version 4.3b) and the results are discussed and compared with theoretical predictions. The performance of intensity modulation/direct detection short range and long rang optical communication systems incorporating the designed modulators is simulated for 40 and 100Gb/s data rates using Optisystem software (version 12). The results reveal that an average energy per bit as low as 0.05fJ can be obtained when the 1550nm modulator is d
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is considered as the key technology to meet the huge demands of data rates in the future wireless communications networks. However, for massive-MIMO systems to realize their maximum potential gain, sufficiently accurate downlink (DL) channel state information (CSI) with low overhead to meet the short coherence time (CT) is required. Therefore, this article aims to overcome the technical challenge of DL CSI estimation in a frequency-division-duplex (FDD) massive-MIMO with short CT considering five different physical correlation models. To this end, the statistical structure of the massive-MIMO channel, which is captured by the physical correlation is exploited to find sufficiently
... Show More