Urea formaldehyde resin was prepared by using basic media by yield 95%. The Remaining of ureaplasts resin were prepared in acetic acid media by high yield. Alkyde resins were prepared by condensation polymerization by react Succinic, Maleic, Phthalic anhydrides with Ethylene glycol or Glycerol. Select samples of the prepared alkyde resins were mixed with Azo dyes in special ratio. The mixtures were used as coatings for wood, and compaised with pure dyes. The Coating that some alkyde resins showed better adhesion from using dyes alone. Preparation of wood coating by mixing ureaplast resins and alkyde resins with Azo dyes in special ratios. The coating showed better adhesion, brighter colors and better resistance to heat from Preceding coat
Abstract: The study aimed to investigate the effect of oral administration of hot aqueous extract of beetle cocoon Larinus maculatus Faldermann, in a two doses 50 and100mg/Kg/B.wt for 3 and 6 weeks respectively on the levels of serum glucose, weight of body, and lipid profile in male mice Mus musculus. The results revealed that there was a significant (p<0.05) decrease in serum glucose level was dose and period dependent. Weight of body also reduced significantly (p<0.05) with doses and period dependent. The lipid profile level significantly (p<0.05) decreased in dose and period’s manner in each of Total cholesterol (TC), Triglyceride (TG), High Density Lipoprotein- (HDL), Low Density Lipoprotein (LDL), and Very Low Density Lipoprotei
... Show MoreThe indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe research topic was chosen as a result of the importance of human resource in business organizations in general and the industrial process in particular. Without the human resource, business organizations cannot continue and achieve success and excellence, and the research problem has been diagnosed in the lack of sales of General Cement Company’s northern products, despite their distinctiveness, standing, and reputation in The market and its products with standard specifications, and through this problem, the following questions were raised: &nbs
... Show MoreAbstract
The study aims to identify the levels of core competencies dimensions and types of organizational flexibility in the investigated organization, as well as to determine the nature of the relationship and the impact of core competencies dimensions with the process of organizational flexibility. Thus, a number of research questions were presented to express the research problem as follows:
- What is the level of the investigated individuals' awareness to core competencies and organizational flexibility across their dimensions and types in the investigated organization?
- To what extent are core competencies and organizational flexibility available in the Organiz
The problem with research lies in hiding the Hanbali approach in building long and short travel provisions, as well as hiding some provisions relating to short travel that are not provided for by the jurists of Hanbali (in their books).
The research aims to demonstrate the approach and standards on which they based the long and short travel provisions, as well as to reflect the provisions of some of the issues that are silent on long and short travel, with evidence and significance.
The research included a preface and two researches, the researcher in the preface talked about the reality of long and short travel, in the first research on the approach of ha
... Show More