تواجه الوحدات الاقتصادية في العراق منافسة قوية بسبب مشكلات خاصة بإرتفاع الاسعار وارتفاع تكاليف الانتاج وضعف الاهتمام بدراسة السوق وغيرها من المشاكل ، فضلاً عن استخدام نظام التكاليف التقليدي الذي لا يوفر معلومات ملائمة لقرارات التسعير الامر الذي يتطلب دراسة وتحليل تلك المشكلات ومعالجتها بالاعتماد على تقنيات حديثة بما يمكنها من المنافسة ولهذا جاء هذا البحث والذي يعتبر من المداخل الحديثة لتخفيض التكاليف ومن ثم زيادة القدرة والاستمرارية على المنافسة في السوق . حيث تمثلت مشكلة البحث في التعرف على اوجه القصور في استخدام النظام التقليدي المتبع في الشركة عينة البحث مما ادى الى ضعف التحكم في التكاليف ، ويهدف البحث الى بيان المرتكزات الاساسية والمعرفية لتقنية التكلفة المستهدفة ونظام التكاليف على اساس الانشطة الموجه بالوقت مع بيان دورهما في تخفيض التكاليف ، واستند البحث الى فرضية مفادها ( تسهم تقنية التكلفة المستهدفة ونظام التكلفة على اساس الانشطة الموجه بالوقت في تخفيض التكاليف ) ، وان ابرز ما توصل اليه البحث ان اعتماد نظام التكاليف على اساس الانشطة الموجه بالوقت يؤدي الى توزيع اكثر عدالة للتكاليف الصناعية غير المباشرة من خلال تحديد تكاليف الانشطة وتوزيع تكاليف هذه الانشطة بشكل اكثر عدالة وتنظيمها على الانشطة بالشكل الذي يؤدي الى تخفيض التكاليف ويقلل الهدر بالموارد فضلاً عن ضرورة تبني الشركات الصناعية العراقية للانظمة التي تنظم توزيع التكاليف على الانشطة بما يحقق الدقة في تحديد تكلفة الوحدة الواحدة ، وبالتالي مساعدة الادارة على التخطيط والرقابة واتخاذ القرارات . وتوصي الباحثتان بضرورة استخدام وتطبيق تقنية التكلفة المستهدفة ونظام التكاليف على اساس الانشطة الموجه بالوقت في الشركة عينة البحث وضرورة تدريب العاملين في الشركة واعداد الدورات التدريبية وضرورة معالجة المعوقات التي تحول دون وجود نظام تكاليف فعال .
The Islamic architectural heritage constitutes a civilized fortune that has to be preserved and protected and work should be done to maintain its development to be more convenient for the circumstances of the age and the civilization transformations. Due to the fact that architecture represents the civilization pot and cultural identity, its originality has to be preserved and work has to be done to prevent the strange architectural invasion that changes its character and make it lose the identity and the character and detached from its roots and environment.
Decoration, in the interior design, as a concept is connected to ornamentation process of interior spaces, which is a process of adding certain items
... Show Moreاستخلص عامل التلزن من E. faecalis EM1 بعد تكسير الخلايا بعدة طرق واختيار الطريقة التي تعطي اعلى قيمة تلزن والترسيب بالكحول الاثيلي , واجري فحص التلزن وقياسه للمستخلص مع انواع من البكتريا السالبة لملون غرام تضمنت Escherichia coli و Klebsiella pneumoniae و Serratia
The coronavirus-pandemic has a major impact on women's-mental and physical-health. Polycystic-ovary-syndrome (PCOS) has a high-predisposition to many cardiometabolic-risk factors that increase susceptibility to severe complications of COVID-19 and also exhibit an increased likelihood of subfertility. The study includes the extent of the effect of COVID-19-virus on renin-levels, glutathione-s-transferase-activity and other biochemical parameters in PCOS-women. The study included 120 samples of ladies that involved: 80 PCOS-patients, and 40 healthy-ladies. Both main groups were divided into subgroups based on COVID-19 infected or not. Blood-samples were collected from PCOS-patients in Kamal-Al-Samara Hospital, at the period between Decembe
... Show More
Metaphor is a linguistic phenomenon related to people's cultures. It is an integral part of cultural heritage. This paper tackles the use of animal-based metaphors in the field of football club titles so as to draw comparisons between those in Russian with their counterparts in Arabic. Names of animals are used to refer to some clubs and teams, where these names or titles reflect animal features such as strength, preying on victims; or animal figures are employed in the club symbols, or due to the similarity of the club shirt to the animal outer shapes in colours. For instance, "an-Nawaris", which means gulls in English, is used to refer to az-Zawraa club du
... Show MoreThe present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders
... Show MoreGastritis can be defined as histological inflammation of the gastric mucosa. It can be classified according to the time course of the disease as acute or chronic, histological findings, anatomic location, and pathological mechanisms. The objective of this study was to evaluation of serum levels of the proinflammatory cytokines IL-8, IL-17 and IL-22 in Helicobacter pylori infection and their association with the degree of gastritis histopathology in a sample of Iraqi patients. The case-control prospective study consists of 60 patients who attended the Gastrointestinal Tract Center at Al-Kindy Teaching Hospital during the period from December 2019 to April 2020. In addition, the control group included 60 apparently healthy individuals. Bio
... Show MoreA theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namely 7-Ethyl-4-methyl-1-[(4-nitro-benzylidene)-amino]-1H-quinolin-2-one (EMNQ2O). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G/ 2d, 2p level was carried out to calculate the geometrical structure, physical properties and chemical inhibition chemical parameters, with the local reactivity in order to predict both the reactive centers and to know the possible sites of nucleophilic and electrophilic attacks, in vacuum and two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in (3.5% NaCl)
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreIn this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More