The study is dealing with an application reengineering process clean solar cells in the Ministry of electricity, as aimed at the possibility of the applicability and impact of re-engineering to achieve the level of performance of the Ministry's operations, with the application of the cleaning process solar cells, developed, improved and found a correlation, statistically significant effect between variable re-engineering and performance as well as the application of process reengineering clean solar cells:1- Before the re-engineering process the total time for cleaning up and solar cell 20 minutes and number of columns performed per day 24 columns and total columns750 which were completed per month that re
... Show MoreThe international reporting auditor witness rapidly developed over the past years, where profession began give attention to the development of auditor reporting and improve its informational report through the issuance and amendment of some relevant international auditing standards. The reality of the situation refers to the failure to inform the auditor in Iraq in many areas, including: Clearly defined management responsibility for the preparation of financial and auditor's responsibility to express an opinion on these statements and Amendment of opinion when the financial statements as a whole is free from material misstatement based on the evidence is sufficient and appropriate audit, or not to build the auditor's ability to obt
... Show MoreTo identify the fungi associated with water hyacinth (Eichhornia crassipes [Mart.] Solms), an aquatic weed, which presents in Tigris river from Baghdad south ward. Five regions from middle and south of Iraq (Al-Noumanya, Saeid Bin-Jubier, Al-Azizia, Al-Reyfay and Al-Hay) were selected for this study. Twelve fungal species were isolated. Alternaria alternata, Acremonium sp and Cladsporium herbarum, were the most frequently species (91.66 % ,50 % and 25 %) respectively. The fungi Alternaria alternata, Acremonium sp. and Phoma eupyrena were more aggressive to water hyacinth as (91.66%,83,33%, and 75%) in pathogenicity test.
Forty – two elderly hypothyroidism patients and forty – two apparently healthy as control groups , divided to (21) male (M) and (21) female (F) also (21) control male C(M) and (21) control female C(F) aged > 60 years, were tested for the presence of thyroid peroxidase autoantibody (TPo – Ab) and thyroglobulin auto antibody (Tg – Ab) , also for Se and Zn levels in their sera . The results revealed a significant increase in (TPO – Ab) and (Tg – Ab) for group (M) and (F) compared to control group , also a siginificant increase in TPo – Ab and Tg – Ab for (F) compared to (M) was found. A significant decrease in Se and Zn level for (M) and (F) compared to control group, while no significant difference between (M) and (F). In conc
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More