Preferred Language
Articles
/
jeasiq-566
THE USE OF SIMULATION AND LINEAR PROGRAMMING IN THE PLANNING OF AUDIT WORK (An Empirical Study in the Office of Financial Supervision)
...Show More Authors

Research includes three axes, the first is the average estimate time of achievement (day) to work oversight, to five supervisory departments in the Office of Financial Supervision Federal and then choose the three control outputs and at the level of each of the five departments above, and after analyzing the data statistically back to us that the distribution of the times of achievement It is the exponential distribution (Exponential Distribution) a parameter (q), and the distribution of normal (Normal Distribution) with two parameters (μ, σ2), and introduced four methods of parameter estimation (q) as well as four modalities parameter to estimate (μ) consistently (σ2), it was estimated average completion time for each of the (q) and (μ), and is considered each random variable has the distribution of initial potential is a function of the average number of sergeants (C), was a comparison between these modalities advantage in the practical side through simulation method using the Monte Carlo method ( Monte Carlo), and a number of users is important statistical measure of the experiences of the average error boxes (MSE) (Mean Square Error), it was in general to reach a good estimate (which has the lowest value of the average error boxes (MSE)) for each type of the three outputs regulatory and the level of all sizes samples (departments subject to regulatory scrutiny PET), and this is the estimated average is the optimum time for the completion of each type of audit reports and the corresponding optimal number of sergeants to accomplish this report.

The second axis of research is planning to set a timetable for the completion of outputs control for the year 2009, as the table's goal is planning the completion of types of audit reports to chapters of the annual plan, and access to the optimum number for the completion of each type of reports as well as the regulatory power optimum (h / Sergeant) in order to be deviation ratios for the completion of the regulatory reporting less as possible by using linear programming, and after the implementation of the models on the program (TORA2006) reached an optimum number to complete the audit reports of various kinds, and each department of supervisory departments, according to the available resources as well as potential regulatory optimum (h / Sergeant) per season .

Finally, the third axis, which included the proposal forms to improve the audit work, the first was (AWP circuits regulatory form for the period from 1/1/2009 until 31/12/2009), and the second (plan and follow up the inputs and outputs of the completion of audit work on the regulatory departments and bodies of the level of form ), which serves as compensation for five types of questionnaires prepared by the Department of Planning and Follow-up in the Office of Financial Supervision.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Revista Iberoamericana De PsicologÍa Del Ejercicio Y El Deporte
DISABILITY-RELATED SELF-ATTENDANCE FEAR AMONG TENNIS AND TABLE TENNIS PLAYERS
...Show More Authors

Abstract The purpose of the study is to develop self-attendance fear measures for table tennis players and tennis players with disabilities, as well as to gauge how severe these fears are in both groups. The authors propose that there are no statistically significant differences in the level of fear of self-attendance for players of ground tennis and table tennis for the disabled between the arithmetic mean and the hypothetical mean. In keeping with the nature of the current study, we adopted a descriptive methodology, and the sample comprised 62 players of table tennis and tennis for the disabled. The authors make use of the Al-Taei prepared scale (fears of selfattendance). The statistical package for educational sciences (spss v 26)

... Show More
Scopus
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Forgiveness level among gifted students and its relation to self-awareness
...Show More Authors

This study aims to identify the forgiveness level among gifted students and its relation to the self-awareness. The study sample consisted of (207) students were randomly chosen, they are integrated in secondary schools in Abha / Saudi Arabia. The correlative, analytical descriptive method was adopted. Two scales were adopted by the researcher: The forgiveness scale prepared by Rye et al (2001) which translated to Arabic by Al-Mahasneh (2017) and the self-awareness scale which prepared by Al-Ghezwani (2017). The study results indicated the following: the forgiveness level among the talented students was high, the self-awareness level among talented students was high, and there is a positive statistically significant relationship

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Emotional Intelligence and its Relationship with Psychological Depression among University Students
...Show More Authors

The psychological scientific studies suggest that basic human situations stem from human emotional abilities and those with a lack of emotional intelligence are unable to cope with life, which might lead to anxiety and psychological depression. The current study aimed to investigate this problem by identifying the level of emotional intelligence and psychological depression among the students of the University of Anbar. To achieve the objectives of the study, the researchers created two questionnaires: 1) to measure emotional intelligence. 2) to measure psychological depression and applied these questionnaires on (300) students. The results revealed that the participants showed a high level of emotional intelligence with a low level of p

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
China's Soft Power and Diplomacy towards Middle East Region after 2011
...Show More Authors

The study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Preparation and characterization DLC thin films using atmospheric pressure plasma Jet
...Show More Authors

Diamond-like carbon, amorphous hydrogenated films forms of carbon, were pretreated from cyclohexane (C6H12) liquid using plasma jet which operates with alternating voltage 7.5kv and frequency 28kHz. The plasma Separates molecules of cyclohexane and Transform it into carbon nanoparticles. The effect of argon flow rate (0.5, 1 and 1.5 L/min) on the optical and chemical bonding properties of the films were investigated. These films were characterized by UV-Visible spectrophotometer, X-ray diffractometer (XRD) Raman spectroscopy and scanning electron microscopy (SEM). The main absorption appears around 296, 299 and 309nm at the three flow rate of argon gas. The value of the optical energy gap is 3.37, 3.55 and 3.68 eV at a different flow rate o

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 16 2022
Journal Name
Sustainability
Intellectual Capital History and Trends: A Bibliometric Analysis Using Scopus Database
...Show More Authors

This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst

... Show More
View Publication Preview PDF
Scopus (71)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref