Singapore has invested its human resources for the development of the country since earlier times, so it has directed attention to the education sector. Education and development complement each other, as investment in education has contributed over several years to the development of Singapore economy and has made it one of the strongest economies in Asia and the world. Despite the obstacles that faced educational policies in Singapore, the presence of a wise leadership capable of overcoming difficulties and solving them, and providing the appropriate atmosphere for the development of education has contributed significantly to making it one of the most advanced educational systems in the world, and making this system the main pillar for the development of the national economy.
A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has
... Show MoreThis study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.
For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan
... Show MoreFrom 211 urine samples, Gram negative bacteria were isolated from only 61 urine samples with isolation percentage 28.9%. Escherichia coli were isolated percentage 70.49% while Klebsiella pneumoniae and Psendomonas aeruginosa were 8.19% and 6.55%, respectively.Proteus spp. Were isolated from 9 (14.75%), P. mirablis and P. vulgaris were isolates percentage 11.47% and 3.27%, respectively. Uroepithelial Cell Adhesin (UCA) fimbriae expression by P.mirabilis isolates was detected by the high capacity to adhesion to human uroepithetial cells, the isolate p.mirabilis U7 was adhesion to human uroepithelial cells mean no.30.2 bacteria/cell when grown on luria broth at 37C for 24h, but then grown it’s on luria agar at 37C for 24h the adhesion
... Show MoreDBN Rashid, 2012 - Cited by 2
This paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe linguistic meaning of the verse in the Arabic dictionaries applies very much to the reality of rent and its effect. This is true of economic growth as a continuous increase in real per capita income in addition to the same thing. Therefore, development does not necessarily achieve a comprehensive and structural increase of the various economic sectors. As the rent came in the sense of a terrible land open Maim any fertilized. And the camel is a ma'aya and a ra'i: that is, it goes in the pasture and returns itself. This is similar to the extraction of oil after it is ready for investment and earn its revenue as soon as it exists or is extracted by external parties. If the rent is first linked to agriculture, especially the fertile lan
... Show MoreThe research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show More