Preferred Language
Articles
/
EEL8Z5oBMeyNPGM3qcHs
تخطيط اوقات انجاز الهيئات الرقابية لدائرة تدقيق نشاط التمويل والتوزيع في ديوان الرقابة المالية الاتحادي باستخدام إنموذج التخصيص العام مع تطبيق عملي
...Show More Authors

تم في هذه الدراسة أعادة التخطيط لتوزيع الهيئات الرقابية على االدارات الخاضعة لتدقيقها لدائرة تدقيق نشاط التمويل والتوزيع في ديوان الرقـابة المالية االتحادي ، وتم بناء أنموذج التخصيص العـام اعتمادا"على لسنة أنجاز أعمال الهيئات الرقابية لالدارات الخاضعة (2016 (أوقـات,حيث أنـه تـم بنـاء أنموذج ريـاضي لتدقيقهاللمجموعة االولى لهيئات هـذه الدائرة وذلك للحصول علىالتخصيص األمثل للهيئات الـرقـابية على االدارات ويهـدف البحث الى التخطيط األمثـل لتوزيع الهيئات الرقابية على االدارات وتقليل وقت أنجـاز أعمال الهيئات الرقابية والمتمثلـة بالمخرجات الرقابية )حساب ختامي ، حساب متراكم ، نتـائج أعمال ،عقود ، تقـريردوري ، تقويم اداء ، زيارة تفتيشية ، اخرى ( والمطلوب أنجازهالكل دائـرة خاضعة لتدقيق الهيئاتفي نهاية كل سنة وتم أستخدام اسلوب البرمجة الخطية الصحيحة لحـل أنموذج التخصيص العام وقـد أستخـدملحـل الرياضية برنامج�𝑺𝑸𝒏𝒊𝒘�هـذه النماذج. وقـد توصل الباحث الى توزيع الهيئات الرقـابية على االدارات بشكل األمثل وأنجاز أعمال الهيئات بأقـل وقت ممكن ، ومن خالل تطبيق النماذج تبين أن مجموع أوقاتاألنجازالكليةللمجموعة االولى بلغت(16387 (يوم بالسنة بينما كان مجموع األوقات الكلية المخطط لها وبالمدة الزمنية نفسها قد بلغت (16506 (أييوم بالسنة بفـارق(119(يـوم بـالسنة،وهـذا دليـل على أمثـليـة النمـاذج الـريـاضيـة لتـخصيص الهيئـات الـرقـابية على االدارات الخاضعة لتدقيقها .

View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Wear Behavior Performance of Polymeric Matrix Composites Using Taguchi Experiments
...Show More Authors

This research estimates the effect of independent factors like filler  (3%, 6%, 9%, 11% weight fraction), normal load (5N, 10N, 15N), and time sliding (5,7 , 9 minutes) on wear behavior of unsaturated polyester resin reinforced with jute fiber and waste eggshell and, rice husk powder composites by utilizing a statistical approach. The specimens polymeric composite prepared from resin unsaturated polyester filled with (4% weight fraction) jute fiber, and (3%, 6%, 9%, 11% weight fraction) eggshell, and rice husk by utilizing (hand lay-up) molding. Dry sliding wear experiments were carried utilizing a standard (pin on disc test setup) following a well designed empirical schedule that depends on Taguchi’s experimental design L9 (MINIT

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Low Fistula in Ano Treatment using Diode Laser 980nm
...Show More Authors

Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
حول أسلوب تحليل التغاير المتعدد باستخدام تصميم قطع منشقة
...Show More Authors

Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.

By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.

We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.

There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.

Key Word: Analysis of variatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
On Comparison Study between Double Sumudu and Elzaki Linear Transforms Method for Solving Fractional Partial Differential Equations
...Show More Authors

        In this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using  Mathcad 15.and graphic in Matlab R2015a.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Al–bahith Al–a'alami
The Visual intertextuality of normalization with Israel in websites of oriented satellite channels: An Analytical study of Al Hurrah Channel
...Show More Authors

The research aims to reveal the methods of visual intertextuality used in the websites of the oriented satellite channel which is Arabic-speaking when addressing normalization with Israel. It also indicates the sources and types of intertextual images, the methodological and semiotic mechanisms for analyzing the intertextuality of news images used on the website of Alhurra satellite channel for the period from 1/6 - 30/8/2022, which included (94) images. The researcher analyzed (37) images with intertextual dimensions, excluding (57) images, which did not carry connotations connected with the inputs and objectives of the research.

The research reach

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: Oil production, Depletion resources, Generations rights, Norway experience, Sustainable development.
...Show More Authors

 

Abstract

      Oil is the most important natural resources in Iraq and represents the goal to others as well as Iraqi people. It is gift from God to all Iraqi people now and future. So we must maintain it and invest its revenue that achieve development in country and ensure the next generations' rights in it without external costs or negative externalities from extracted and invested it.

    The most problems that we attempt to solve by this research are the exhausted, environmental degradation and theft from next generation that produced with oil contracts between Iraq and foreign companies. From here was th

... Show More
View Publication Preview PDF
Crossref