ract
This reaserch seeks To answer Wondering :(Is there a possibility employ strategic agility In companies sample Serving in Iraq ?)
This reaserch aims: explore Strategic Agility rely upon Dimensions that interact with each other to form the intcllectual frame Strategic Agility, These dimensions are: (Clarity of vision, Selected
... Show MoreThis paper presents the motion programming and control of omni-directional mobile robot through the process of building and programming a small robotic platform with secondary design criteria of modularity and simplified control. This is accomplished by combining the positive aspects of several different robotics platform ideas. The platform is shaped like an equilateral triangle with a servo motor, sensors, and omni-wheel, controlled by a PIC microcontroller.
In this work the kinematics, inverse kinematics and dynamic module for the platform is derived. Two search algorithms (the wall-following search and the “most-open-area” search) is designed, tested, and analyzed experimentally.
A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show MoreThis study investigates consecutive reaction assisted by pervaporation for the first time. It studies the saponification of diethyladipate DA with sodium hydroxide NaOH solution synchronous with separating ethanol from the reaction mixture through an aqueous – organic membrane. The effect of time on some variables such as: permeated ethanol concentration EtOH wt%, separation factor (α), concentration of NaOH solution CB in the reaction medium and the conversion of DA to monoethyladipate (the intermediate product) was studied. It was shown that EtOH wt% and the conversion increased with increasing time unlike CB but (α) showed the existence of maximum value during the time of experiment. The process of reaction assisted by pervaporation
... Show MoreOur country suffered from pollution translation as a result to the wars events, so, it is necessary to measure the amount of radiation in the fields that are of indirect contact with human life and health. The main aim of the present work is to measure the concentration of alpha emitters in tomato fruits collected from different farms in Al – Basra governorate in the south of Iraq. Nuclear track detectors of type CR – 39 are used as a detection device and Can technique as a detection technique. Results show that the maximum concentration recorded is sample no.7 of site Al – Rafidhya which was equal to (6.9621 ± 0.111) ppm and sample no.1 of site Lothan with concentration equals to (4.9236 ± 0.117) ppm. The minimum concentratio
... Show MoreAn efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show More