The aim of this work is to provide an efficient selection technique as a part of planning process to guide the decision makers to decide the preferences of one supplier over another for purchasing lab instruments in education domain. Fuzzy Analytical Hierarchy Process has used as a multi-criteria decision process, as an industrial engineering tool with certain emphasis on the qualitative aspects required to the decision makers. While the concept of degree of possibility for each criterion is used to reach its relative weights, a specific methodology created to reach the final objective decision of supplier selection. A questionnaire form was developed and distributed to five universities located in Baghdad province with a total number of 100 questionnaires. The response was very adequate. Three main criteria are adopted- supplier, instruments and service performance grade. Moreover, there are sixteen sub-criteria for evaluating three potential suppliers. The final decision is reached with almost risk-free as it relates to the qualitative aspects of experts. The conclusion reached is that local supplier has a large priority weight. Microsoft Excel is used to achieve the sequential calculations for Fuzzy AHP.
We must live in an era dominated by the call for equality between men and women, in which the voices of advocates of gender integration were heard. After women opened their doors to compete with their brother, Knowledge, and culture in the various forms of life, language as a science of the time and knowledge of the other had to match this reality and express the most accurate expression of this task
The Abbasid state inherited many enemies because of the Islamic conquests in the Umayyad era and its geographical extension, which included a number of seas, so it had to direct its energy to preserve the achievements achieved by its predecessors from the Muslims. One of the sea princes who had a role in protecting the coasts of the Abbasid state, especially in the Levant and Egypt.
يقوم الخطأ المضمر على فكرة مبناها استنتاج الخطأ من وقوع الضرر، منشئاً بذلك قرينة قانونية بسيطة للمدعي (المضرور) تعفيه من اثبات خطأ المدعى عليه (المسؤول)، وهذا الافتراض في الاساس فكرة قضائية وجدت لمساعدة المضرور في الحصول على التعويض في حالة عدم تمكنه من تحديد خطأ المسؤول ، الا انه افتراضٌ قابلٌ لإثبات العكس من خلال نفي اي خطأ صادر عن المدعى عليه ، ويمكن نفيه ايضاً بإثبات انقطاع السببية بين الخطأ المضمر والضرر
... Show Moreلما كانت الوظيفة الأساسية للغة هي الوظيفة التواصلية ، أو التبادل الكلامي بين المخاطب والمستمع ، فكان لا بد لهذه الوظيفة من آليات – لغوية وبلاغية – يستعملها المتكلم أو المرسل للخطاب الأدبي لتوجيه ذهن السامع أو المخاطب نحو ما يطرحه من أفكار ، ورؤى ، واقناعه عن طريق التواصل ، بمضمون الخطاب واستلزام سرعة الانجاز ، وتأسيساً على ذلك جاء هذا البحث لبيان هذه الآليات في الخطاب القرآني متمثلاً في سور الطور
... Show Moreاثر التواجد العسكري الامريكي على النظام السياسي في العراق
Financial institutions, including banks, remain a major target for money launderers in order to transfer illegal funds to legitimate funds through limited internal audit procedures and external auditing.
The study is a study of the operations of money laundering and what can be done by the verification efforts when integrated in the fight against them, by analyzing the level of cooperative relationship and communication between them. To achieve the objectives of the study, a questionnaire prepared for this purpose was distributed to an appropriate sample of (60) auditors of the internal audit staff of the Central Bank of Iraq and the external auditors working in the Federal control foundation Accordingly , appropriate methods wer
... Show Moreيهدف البحث الى قياس مستوى ارتباط وتأثير القدرات المعرفية الدينامية في تنافسية الاعمال، وتكونت العينة من (155) فردا في اربعة مصانع للالبان في بغداد وهي (ابو غريب، والزراعة، والحلال، وعيون الرافدين) اذ تمثل مجتمع البحث من اصحاب المصانع، والمديرين والعاملين في السيطرة النوعية والبحث والتطوير والمهندسين والفنيين والعاملين ذوي الخبرة في صناعة الالبان. وجرى تحليل البيانات واختبار الفرضيات باستخدام الادوات الإحصا
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show More