Preferred Language
Articles
/
EEL8Z5oBMeyNPGM3qcHs
تخطيط اوقات انجاز الهيئات الرقابية لدائرة تدقيق نشاط التمويل والتوزيع في ديوان الرقابة المالية الاتحادي باستخدام إنموذج التخصيص العام مع تطبيق عملي
...Show More Authors

تم في هذه الدراسة أعادة التخطيط لتوزيع الهيئات الرقابية على االدارات الخاضعة لتدقيقها لدائرة تدقيق نشاط التمويل والتوزيع في ديوان الرقـابة المالية االتحادي ، وتم بناء أنموذج التخصيص العـام اعتمادا"على لسنة أنجاز أعمال الهيئات الرقابية لالدارات الخاضعة (2016 (أوقـات,حيث أنـه تـم بنـاء أنموذج ريـاضي لتدقيقهاللمجموعة االولى لهيئات هـذه الدائرة وذلك للحصول علىالتخصيص األمثل للهيئات الـرقـابية على االدارات ويهـدف البحث الى التخطيط األمثـل لتوزيع الهيئات الرقابية على االدارات وتقليل وقت أنجـاز أعمال الهيئات الرقابية والمتمثلـة بالمخرجات الرقابية )حساب ختامي ، حساب متراكم ، نتـائج أعمال ،عقود ، تقـريردوري ، تقويم اداء ، زيارة تفتيشية ، اخرى ( والمطلوب أنجازهالكل دائـرة خاضعة لتدقيق الهيئاتفي نهاية كل سنة وتم أستخدام اسلوب البرمجة الخطية الصحيحة لحـل أنموذج التخصيص العام وقـد أستخـدملحـل الرياضية برنامج�𝑺𝑸𝒏𝒊𝒘�هـذه النماذج. وقـد توصل الباحث الى توزيع الهيئات الرقـابية على االدارات بشكل األمثل وأنجاز أعمال الهيئات بأقـل وقت ممكن ، ومن خالل تطبيق النماذج تبين أن مجموع أوقاتاألنجازالكليةللمجموعة االولى بلغت(16387 (يوم بالسنة بينما كان مجموع األوقات الكلية المخطط لها وبالمدة الزمنية نفسها قد بلغت (16506 (أييوم بالسنة بفـارق(119(يـوم بـالسنة،وهـذا دليـل على أمثـليـة النمـاذج الـريـاضيـة لتـخصيص الهيئـات الـرقـابية على االدارات الخاضعة لتدقيقها .

View Publication
Publication Date
Wed Nov 19 2025
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The role of an active teacher in developing the curriculum by using educational techniqes a theoretical study
...Show More Authors

Preparing teacher occupies the attention of many thinkers and philosophers since the age of
kaldinics ( people of mesoptam / 2342 pH ) to the Islamic age where moslems philosophers
focus their attention on thought and philosophy where the philosophy of that teaching
depends on : teacher , student and family begin .
So , the issue of preparing and training teacher occupies the attention of education scientists
depending on his vital and important role in implementing of teaching policies in philosophies
and Islamic educational thought , therefore , the preparing and development of the teacher
regards as one of the basics of teaching development because of its importance in
development of teaching performance and th

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Forecasting The Wet and Dry Rainy Seasons in Mosul Using Standardized Precipitation Index (SPI)
...Show More Authors

Iraq suffers the continuing lack of water resources in generdwether it is surface or underearth water or rain. The study of rain has got the utmost importance in order to the rain direction in Iraq and in Mosul in particular and what it will be in future. It also shows the wet as well as the dry seasons and the possibility of expecting them and expecting their quantities in order to invest them and to keep this vital resource The research deals with predict the wet and dry rainy seasons in Mosul using (SPI) Standardized precipitation index extracted from conversion of Gamma distribution to standardized normal distribution , depending on data of monthly rain amounts for 1940-2013 . Results showed existence of 31 w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 21 2020
Journal Name
Baghdad Science Journal
Spectrophotometer Determination of Cefixime in pure form and pharmaceutical preparation by Using Cloud point Extraction
...Show More Authors

Two simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using  Trtion X-114 as surfactant. Beer

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2004
Journal Name
Al-academy
تقييم قابلية اداء متطلبات العمل للعاملين في الصناعة باستخدام طريقة القصور الذاتي
...Show More Authors

تقييم قابلية اداء متطلبات العمل للعاملين في الصناعة باستخدام طريقة القصور الذاتي

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Removal of Suspended Solids Using Pumice Stone in Integrated Fixed Film Activated Sludge Process
...Show More Authors

Wastewater treatment plants operators prefer to make adjustments because they are more cost effective, to use the existing tank instead of building new ones. In this case an imported materials would be  used as bio-loads to increase biomass and thus maintain efficiency as the next organic loading increases.In the present study, a local substance "pumice stone" was used as a biological carrier in the aeration tank, and the experiments were carried out in five stages: without biological carriers, filling ratio of 4%,10%,20%, and25% with pumice stone, the maximum organic loading at each stage (1.1884, 1.2144, 1.9432, 2.7768, 3.3141)g BOD /l.d respectively.Other experiments were carried out to determine the best filling ratio, the SS remova

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Experimental Investigation of Using Evaporative Air Cooler for Winter Air-Conditioning in Baghdad
...Show More Authors

This paper presents an efficient methodology to design modified evaporative air-cooler for winter air-conditioning in Baghdad city as well as using it for summer air-conditioning by adding a heating process after the humidification process. laboratory tests were performed on a direct evaporative cooler (DEC) followed by passing the air on hot water through heat exchanger placed in the coolers air duct exit. The tests were conducted on the 2nd of December /2011 when the ambient temperature was 8.1°C and the relative humidity was  (68%). The air flow rate is assumed to vary between 0.069 to 0.209 kg/s with constant water flow rate of 0.03 kg/s in the heat exchanger. The performance is reported in terms of effectiveness of DEC, satura

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
K-Nearest Neighbor Method with Principal Component Analysis for Functional Nonparametric Regression
...Show More Authors

This paper proposed a new  method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates  are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It  utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA))  for measureing the closeness between curves.  Root Mean Square Errors is used for the  implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when  the cov

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref