The formal integration of the interior spaces in general and the commercial spaces of the watch shops in the large commercial centers in particular is the goal that the designers aim to reach in order for the interior space to become successful in terms of the design idea and its characteristics. Implementation mechanism. One of the reasons for achieving formal integration in the interior spaces of watch shops is the requirements of the design that must be available in these spaces to reach a state of formal integration between the interior and the exterior so that the space becomes fully integrated in all respects. Because of the aforementioned reasons for dealing with the research, through four chapters: The first chapter included the research plan and its problem, which was summarized in the following question: (What are the design requirements that must be available in the interior design? Shop spaces that sell watches as commercial spaces require formal integration)? The importance of the research, its objective, the objective limits, the spatial and temporal limits of the research were also highlighted, and the most important terms mentioned in the research title were identified. As for the second chapter, it included previous studies and the theoretical framework, which included two parts. The first dealt with formal integration into the interior spaces. As for the second, it dealt with the internal commercial spaces in all its details, in addition to the results of the theoretical framework in terms of indicators. As for the third chapter, it was devoted to the research procedures, as the researcher relied on the descriptive approach in analyzing the selected samples and models. The fourth chapter also included the results of the analysis and the conclusions obtained in light of the research objective, recommendations and proposals. and a list of sources and appendices.
The research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show MoreThe importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process. The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason
... Show MoreThe aim of the research is to diagnose and analyze the gap between the actual reality and the application of the eighth requirement (operation) in the National Insurance Company in accordance with the international standard specification for the quality management system (ISO 9001:2015), which is related to the planning, implementation and control of operations, which would raise the level of performance of employees and be reflected in the provision of An appropriate service for the faithful, as the reality of the condition of the requirement was studied by identifying the strengths and weaknesses of the system to diagnose the gap and find ways to address it. A workshop was held with company officials, through which questions were raise
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MorePV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building 220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More
Summary
The book (Fatah al-Rahman reveals what is ambiguous in the Qur’an), which is a book of verbal similarities that tries to touch the Qur’an expression, and the subtle differences between its expressions and expressions. It appeared when it appeared in many chapters, from which I chose to delete in monolithic letters such as Ba and Ta, and to heal and delete in non-monosymbols such as (that) and (may) and (no), so the search came to two chapters The first is for deleting the monolithic letters, and the second is for deleting non-monosyllabic letters, preceded by introductory discussions revolving around the linguistic and idiomatic definition of deletion, a brief translation of the
... Show MoreThe research aims to achieve market share requirements and reach the targeted competitive price through the application of management accounting techniques represented by continuous improvement technique and target costing under an Activity Based Cost (ABC) system and Activity Based Management (ABM), In Muthanna Cement Company to reach the rationalization of the cost of the product and maintain the required quality and improve the profitability of the company.
The problem of research has emerged in the inability of local firms to enter into effective competition with other companies operating in the same economic sector, Because of the high cost of its products, Which led to the sale of the product at prices below its cost, and t
... Show More