تم في هذه الدراسة أعادة التخطيط لتوزيع الهيئات الرقابية على االدارات الخاضعة لتدقيقها لدائرة تدقيق نشاط التمويل والتوزيع في ديوان الرقـابة المالية االتحادي ، وتم بناء أنموذج التخصيص العـام اعتمادا"على لسنة أنجاز أعمال الهيئات الرقابية لالدارات الخاضعة (2016 (أوقـات,حيث أنـه تـم بنـاء أنموذج ريـاضي لتدقيقهاللمجموعة االولى لهيئات هـذه الدائرة وذلك للحصول علىالتخصيص األمثل للهيئات الـرقـابية على االدارات ويهـدف البحث الى التخطيط األمثـل لتوزيع الهيئات الرقابية على االدارات وتقليل وقت أنجـاز أعمال الهيئات الرقابية والمتمثلـة بالمخرجات الرقابية )حساب ختامي ، حساب متراكم ، نتـائج أعمال ،عقود ، تقـريردوري ، تقويم اداء ، زيارة تفتيشية ، اخرى ( والمطلوب أنجازهالكل دائـرة خاضعة لتدقيق الهيئاتفي نهاية كل سنة وتم أستخدام اسلوب البرمجة الخطية الصحيحة لحـل أنموذج التخصيص العام وقـد أستخـدملحـل الرياضية برنامج�𝑺𝑸𝒏𝒊𝒘�هـذه النماذج. وقـد توصل الباحث الى توزيع الهيئات الرقـابية على االدارات بشكل األمثل وأنجاز أعمال الهيئات بأقـل وقت ممكن ، ومن خالل تطبيق النماذج تبين أن مجموع أوقاتاألنجازالكليةللمجموعة االولى بلغت(16387 (يوم بالسنة بينما كان مجموع األوقات الكلية المخطط لها وبالمدة الزمنية نفسها قد بلغت (16506 (أييوم بالسنة بفـارق(119(يـوم بـالسنة،وهـذا دليـل على أمثـليـة النمـاذج الـريـاضيـة لتـخصيص الهيئـات الـرقـابية على االدارات الخاضعة لتدقيقها .
المقدمة:
مع مطلع القرن الحادي والعشرين فأن الصراع على امدادات المياه الحيوية هو خطر قائم على الدوام في جميع مناطق العالم حيث يتجاوز الطلب على الماء بشكل كبير العرض القائم ولكون اغلب المصادر الرئيسة للمياه وخاصة في المنطقة العربية يشترك فيها بلدان أو أكثر ولان هذه الدول نادرا ما توافق على الاجراءات التفاوضية الخاصة بأقتسام الامداد المتاح من المياه مما يعني زيادة الخلافات على الوصول الى الم
... Show MoreIn the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific
... Show MoreThe optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreThe proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreAbstract
The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's management experience is how to achieve thes
... Show MoreAbstract
Black paint laser peening (bPLP) technique is currently applied for many engineering materials , especially for aluminum alloys due to high improvement in fatigue life and strength . Constant and variable bending fatigue tests have been performed at RT and stress ratio R= -1 . The results of the present work observed that the significance of the surface work hardening which generated high negative residual stresses in bPLP specimens .The fatigue life improvement factor (FLIF) for bPLP constant fatigue behavior was from 2.543 to 3.3 compared to untreated fatigue and the increase in fatigue strength at 107 cycle was 21% . The bPLP cumulative fatigue life behav
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More