قياس جودة نظام الحكم أنموذج فعالة الأداء الحكومي في العراق
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreAfter the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
SCADA is the technology that allows the operator to gather data from one or more various facilities and to send control instructions to those facilities. This paper represents an adaptable and low cost SCADA system for a particular sugar manufacturing process, by using Programmable Logic Controls (Siemens s7-1200, 1214Dc/ Dc/ Rly). The system will control and monitor the laboratory production line chose from sugar industry. The project comprises of two sections the first one is the hardware section that has been designed, and built using components suitable for making it for laboratory purposes, and the second section was the software as the PLC programming, designing the HMI, creating alarms and trending system. The system will ha
... Show MoreThe main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed
... Show MoreHuman Rights The word of graduation in the Arabic language to many meanings may be the most appropriate of what Al-Ragheb Al-Isfahani said in the right: is the coming of the thing from saying or doing at the time it must and in the form that must be, so the term human rights includes the following:First: A party has the right and another duty to.
The study aimed to identify the reality of the application of cost accounting system in the contracting institutions in Saudi Arabia, and the extent of the reflection of the application of this system on the effectiveness and efficiency of the general performance of these institutions. Where the research community consists of the contracting institutions operating in the Saudi Arabia, and then a suitable random sample was selected from seventy one institutions. The researchers used the historical method to track the previous studies as well as the descriptive approach to conducting the field study. The study data were analyzed by SPSS statistical program.
The results of this study conclude that there is a
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreRecent advancement in production technologist of manufacturing processes have left an important effects upon cost structure. Moreover the problem for providing necessary and adequate information for managerial decision making.
Therefore the cost – volume – profit analysis under the new activity based costing has replace the old method for Analysing the relation between C.V.P with respect to profit planning and control.
In brief the C.V.P object is to discuss the effect of changes on profit resulting from changes in sales volume, cost of manufacturing and selling price.
This study consists of four chapters:
The first chapter dea
... Show MoreObjective: To establish growth curve for a sample of infertile women and to assess Body Mass Index.
Methodology: Non-probability (purposive sample) of (100) infertile women, who visit Kamal Al-Samaraee
Hospital/ fertility and IVF center . The data are collected through the use of constructed questionnaire, which
consists of two parts. Part 1: consists of (5) items about demographic characteristics, part 2: consists of (4) items
about reproductive status, descriptive statistical analysis procedures (frequency, percentage, Contingency
coefficients, polynomial cube order).
Results: Revealed that the infertile women in the study group had decrease in their Body Mass Index with aging
(with increase of infertility duration