The aim of the study is to examine the challenges of financing small and medium enterprises in Iraq and subsequently to proffer solutions to mitigate problems. These solutions are achieved by focusing on the role of accounting information on the financial projects in for example, hotel construction, and by providing the necessary accounting information for the concerned parties to finance these projects. In order to highlight the challenges associated with the funding of small and medium enterprises and the role of accounting information in reducing those challenges, a questionnaire was prepared. As the government authorities are the ones responsible for the accomplishment of these projects, a questionnaire form was distributed in the project department in the Iraqi Ministry of Labor and Social Affairs. The study found that, if project owners provide information with the specific characteristics of accounting information, there is a role for accounting information in reducing SME financing constraints in Iraq
In this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho
... Show MoreBackground: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show MoreIn most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe CuInSe2 (CIS) nanocrystals are synthesized by arrested precipitation from molecular precursors are added to a hot solvent with organic cap- ping ligands to control nanocrystal formation and growth. CIS thin films deposited onto glass substrate by spray - coating, then selenized in Ar- atmosphere to form CIS thin films. PVs were made with power conversion efficiencies of 0.631% as -deposited and 0.846% after selenization, for Mo coated, under AM 1.5 illumination. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CIS have the chalcopyrite structure as the major phase with a preferred orientation along (112) direction and the atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2
Nanotechnology is a continually expanding field for its uses and applications in multiple areas i.e. medicine, science, and engineering. Biosynthesis is straightforward, less-toxicity, and cost-effective technology. TiO2 NPs biosynthesis has attained consideration in recent decades. In this study, probiotic bacteria were isolated from cow’s raw milk samples, and then were identified by using the Vitek2 system; as Leuconostoc spp. included Leuconostoc mesenteroides subsp. mesenteroides (Leu.1), Leuconostoc mesenteroides subsp. cremoris (Leu.4), and Leuconostoc pseudomesenteroides (Leu.14). All Leuconostoc spp. isolates showed an ability for TiO2 NPs bio-production, after being incubated at anaerobic conditions (30 o C/ 24 h) in DeM
... Show More