Over application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))
Become attention to quality is a global phenomenon, and I took organizations and governments around the world attaches special attention, but we can say that quality has become the first function for many organizations, and has become a management philosophy
The aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri
... Show MoreIntroduction/Aim. Seminal fluid analysis (SFA) plays a crucial role in helping infertility clinics diagnose the underlying reason of male infertility. The aim of the study was to investigate seminal fluid patterns of male partners of an infertile couple with apparently fertile female partners. Materials and methods. A cross-sectional study was conducted between January 2019 and December 2022. Patients were attending consultations for delayed conception for more than 12 months with apparently fertile female partner. Results. Four hundred fifty-three patients were included in the study. The distribution of patients according to age groups showed that 277 patients were young, aged 21 - 30 years (61%). Two hundred sixty-two (58%) patien
... Show MoreThis work presents the modeling of the electrical response of monocrystalline photovoltaic module by using five parameters model based on manufacture data-sheet of a solar module that measured in stander test conditions (STC) at radiation 1000W/m² and cell temperature 25 . The model takes into account the series and parallel (shunt) resistance of the module. This paper considers the details of Matlab modeling of the solar module by a developed Simulink model using the basic equations, the first approach was to estimate the parameters: photocurrent Iph, saturation current Is, shunt resistance Rsh, series resistance Rs, ideality factor A at stander test condition (STC) by an ite
... Show MoreImage segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima