تم في هذه الدراسة أعادة التخطيط لتوزيع الهيئات الرقابية على االدارات الخاضعة لتدقيقها لدائرة تدقيق نشاط التمويل والتوزيع في ديوان الرقـابة المالية االتحادي ، وتم بناء أنموذج التخصيص العـام اعتمادا"على لسنة أنجاز أعمال الهيئات الرقابية لالدارات الخاضعة (2016 (أوقـات,حيث أنـه تـم بنـاء أنموذج ريـاضي لتدقيقهاللمجموعة االولى لهيئات هـذه الدائرة وذلك للحصول علىالتخصيص األمثل للهيئات الـرقـابية على االدارات ويهـدف البحث الى التخطيط األمثـل لتوزيع الهيئات الرقابية على االدارات وتقليل وقت أنجـاز أعمال الهيئات الرقابية والمتمثلـة بالمخرجات الرقابية )حساب ختامي ، حساب متراكم ، نتـائج أعمال ،عقود ، تقـريردوري ، تقويم اداء ، زيارة تفتيشية ، اخرى ( والمطلوب أنجازهالكل دائـرة خاضعة لتدقيق الهيئاتفي نهاية كل سنة وتم أستخدام اسلوب البرمجة الخطية الصحيحة لحـل أنموذج التخصيص العام وقـد أستخـدملحـل الرياضية برنامج�𝑺𝑸𝒏𝒊𝒘�هـذه النماذج. وقـد توصل الباحث الى توزيع الهيئات الرقـابية على االدارات بشكل األمثل وأنجاز أعمال الهيئات بأقـل وقت ممكن ، ومن خالل تطبيق النماذج تبين أن مجموع أوقاتاألنجازالكليةللمجموعة االولى بلغت(16387 (يوم بالسنة بينما كان مجموع األوقات الكلية المخطط لها وبالمدة الزمنية نفسها قد بلغت (16506 (أييوم بالسنة بفـارق(119(يـوم بـالسنة،وهـذا دليـل على أمثـليـة النمـاذج الـريـاضيـة لتـخصيص الهيئـات الـرقـابية على االدارات الخاضعة لتدقيقها .
This research estimates the effect of independent factors like filler (3%, 6%, 9%, 11% weight fraction), normal load (5N, 10N, 15N), and time sliding (5,7 , 9 minutes) on wear behavior of unsaturated polyester resin reinforced with jute fiber and waste eggshell and, rice husk powder composites by utilizing a statistical approach. The specimens polymeric composite prepared from resin unsaturated polyester filled with (4% weight fraction) jute fiber, and (3%, 6%, 9%, 11% weight fraction) eggshell, and rice husk by utilizing (hand lay-up) molding. Dry sliding wear experiments were carried utilizing a standard (pin on disc test setup) following a well designed empirical schedule that depends on Taguchi’s experimental design L9 (MINIT
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreAnal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm
Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.
By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.
We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.
There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.
Key Word: Analysis of variatio
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
In this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
The research aims to reveal the methods of visual intertextuality used in the websites of the oriented satellite channel which is Arabic-speaking when addressing normalization with Israel. It also indicates the sources and types of intertextual images, the methodological and semiotic mechanisms for analyzing the intertextuality of news images used on the website of Alhurra satellite channel for the period from 1/6 - 30/8/2022, which included (94) images. The researcher analyzed (37) images with intertextual dimensions, excluding (57) images, which did not carry connotations connected with the inputs and objectives of the research.
The research reach
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Abstract
Oil is the most important natural resources in Iraq and represents the goal to others as well as Iraqi people. It is gift from God to all Iraqi people now and future. So we must maintain it and invest its revenue that achieve development in country and ensure the next generations' rights in it without external costs or negative externalities from extracted and invested it.
The most problems that we attempt to solve by this research are the exhausted, environmental degradation and theft from next generation that produced with oil contracts between Iraq and foreign companies. From here was th
... Show More