Abstract
The intellectual capital an important variable in the equation of the success of seeking economic units to achieve a competitive advantage, since it is a real capital for economic unity it constitutes a strategic importance as the main source to achieve high profitability in the economic unit and highlights the importance of showing intellectual capital components of the main Represent of human capital and structural capital and relational capital, through effective and the prominent role played by intellectual capital within the economic unity in order to achieve a sustainable competitive advantage contribute to attracting investors with longer investment decision of the most important and difficult decisions ta
... Show MoreThe research aims to highlight the role played by the target costing technique as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information and scientific foundations it provides in the allocation of indirect costs and the accuracy in measuring the cost from the start of the project planning process up to the production process and indicating the extent of its impact on decisions Pricing in a way that contributes to the rationalization of pricing decisions in economic units in the light of intense competition and the multiplicity of alternatives.
The aim of the research is to demonstrate the extent of the impact of resource consumption accounting technicality as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information it provides and scientific foundations in the allocation of indirect costs, and the identification and measurement of idle energy and its costs in a way that contributes to the rationalization of pricing decisions in economic units. In light of the intense competition and the multiplicity of alternatives, and to achieve this goal, a random sample was chosen.
Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show MoreModern emerged technologies impose development and fabrication of miniatur-ized parts and devices in the micro- and nano-scale. Producing micro- and nano-featured structures requires nonconventional machining processes where con-ventional machining processes such as grinding, milling and eroding have failed. New emerging processes, such laser machining processes, are still fraught with almost invincible processes. Micro-/nano-machining are the pro-cesses of producing parts, microsystems or features at a scale of a few microm-eters and less than one hundred nanometers, respectively. Precise cutting and clean material removal accompanied with a negligible heat affected zone (HAZ), which are usually the characteristics of laser ablation, have
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe excessive and rapid urban growth witnessed by most cities in the world can be a cause of diseases and epidemics, especially those problems related to population, which include problems of transportation and increase in density in the centers, in addition to the lack of interest in planning and designing those cities to take into account the health aspect of the city and obtain The health well-being of the population, and each of these problems has negative effects on health in general and on human health in particular through its prevalence. Therefore, many concepts that serve as a tool for achieving public health and the physical health of the population have emerged, including the concept of city health, which is defined as cities
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More