This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute difference (AD) and compared with the overall average of precision and recall.
This research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant
... Show MoreIn a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amou
... Show MoreIt is proposed and studied a prey-predator system with a Holling type II functional response that merges predation fear with a predator-dependent prey's refuge. Understanding the impact of fear and refuge on the system's dynamic behavior is one of the objectives. All conceivable steady-states are investigated for their stability. The persistence condition of the system has been established. Local bifurcation analysis is performed in the Sotomayor sense. Extensive numerical simulation with varied parameters was used to explore the system's global dynamics. A limit cycle and a point attractor are the two types of attractors in the system. It's also interesting to note that the system exhibits bi-stability between these 2 types of attractors.
... Show MoreThe study aimed to identify the impact of the use of systemic approach in the collection of geographical material and cognitive motivation when fifth grade students of literary, experimental design researcher adopted a partial seizures, and telemetric to two unequal one experimental and the other officer.
The sample consisted of fifth grade literary students from secondary (inherent) for Boys in Baghdad (the Republic of Iraq. (By Mjootain, and the number of students of each group (30 students). And has rewarded the two groups, in the variables (chronological age, average scores half-year, degree IQ),
Promising researcher himself requirements of research to determine the scientific material and teaching plans and the formulation of
The internal observing system is considered a cornerstone for the high management in all the systems. It aims at defending the things for waste and increasing efficient and application the rules and regulations and constrictions. To easier for the high management activity in the internal observing system which in presented and practiced and to what extent can depend on it. Thus it goes to evaluate the internal observing system periodically to check the weak points in that system so as the find out the mistake, in the construction of the system or mistake, by indication of the workers. The importance of this study is represented in the need of increasing the coactivity in the internal observing system so as to be in touch with the new tre
... Show MoreThe research seeks to highlight the importance of digital finance in banking by providing financial and banking services and its role in improving the access of financial services to customers at the farthest possible point by using modern technology to finance their needs by granting them cash credits through electronic payment tools to facilitate them and shorten time and effort as well as Low cost, and this cannot be achieved without concerted efforts and the provision of basic infrastructure that includes connecting the Internet to all targeted areas, whether cities or rural areas, as well as distributing the largest possible number of ATMs and sending specialized teams to those areas that develop in customers the culture of digital
... Show MoreBackground: The appointment system is a common practice in primary health care clinics in developed countries. The patients and health care providers in the primary health care setting perceived the appointment system as an indicator of good quality service.
Objective: The aim of this study was to survey patients’ and health care providers’ attitudes towards the introduction of an appointment system and their satisfaction with the existing ‘walk-in’ system in the primary health care setting.
Subjects and Methods: A questionnaire survey was conducted included a convenient sample of 234 patients as well as 76 health care providers from two primary health care center
... Show MoreBackground: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.
Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.
Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.
... Show More