Purpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met. Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical presentation of the importance of balancing programs and performance through criticisms directed at the traditional budget, known as item balancing. Design/methodology/approach: The idea of reforming the Iraqi budget was born in the government as a result of the catastrophic failure of many government projects. After the decline in oil prices, which is the main source of financing public spending. Not to mention the war on ISIS, which made the budget sag with public spending. The study was conducted by relying on the questionnaire form. Which was distributed to a number of auditors, numbering 120 people. The study (Ho, 2018) was relied upon in conducting the applied study. Findings: The results of the survey indicate the weakness of the possibility of applying the program budget in all its six basic stages, as it mainly requires amending the accounting system. This amendment also includes the use of cost accounting as a main element on which this budget is based in order to determine the goal of each program. Research, Practical & Social implications: The traditional budget focuses on what is inevitably spent without focusing on how to manage resources under specific programmes. As a result, these effects have been reflected on many development projects, the completion of which is often delayed. Program and performance budget focuses on the program as a whole, and each program is evaluated according to what was implemented during the year. Originality/value: This study is the first of its kind, which focused on the requirements of applying budget performance in Iraqi government-affiliated companies. With the aim of determining the adoption requirements in a way that can contribute to making recommendations towards the process of adopting this type of budget.
A total of (25) stool samples were collected from children and adults (2- 4) years old suffering from diarrhea to isolate E. coli strains that produce heat-stable enterotoxin a (STa), and after performing microscopic examination, cultural characterization and biochemical identification only (11) isolates showed positive E. coli. STa activity was estimated by using suckling mouse assay (SMA) and from these (11) isolates only (5) showed STa activity and the one with the highest STa activity was selected for large scale production of STa, which was followed by partial purification using ion-exchange chromatography (normal phase) using DEAE sephadex A-50 column. After purification and determination of protein concentration by using the standard
... Show MoreIt is very difficult to obtain the value of a rock strength along the wellbore. The value of Rock strength utilizing to perform different analysis, for example, preventing failure of the wellbore, deciding a completion design and, control the production of sand. In this study, utilizing sonic log data from (Bu-50) and (BU-47) wells at Buzurgan oil field. Five formations have been studied (Mishrif, Sadia, Middle lower Kirkuk, Upper Kirkuk, and Jaddala) Firstly, calculated unconfined compressive strength (UCS) for each formation, using a sonic log method. Then, the derived confined compressive rock strengthens from (UCS) by entering the effect of bore and hydrostatic pressure for each formation. Evaluations th
... Show Morestructural and electrical of CuIn (Sex Te1-x)2
The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show MoreThe main goal of this paper is to introduce the higher derivatives multivalent harmonic function class, which is defined by the general linear operator. As a result, geometric properties such as coefficient estimation, convex combination, extreme point, distortion theorem and convolution property are obtained. Finally, we show that this class is invariant under the Bernandi-Libera-Livingston integral for harmonic functions.
This research is devoted to study the effect of different in weight percentage of Sio2 particles and glass fibers (5, 10, 15, 20) wt. % on the wear rate epoxy resin. The results show that the value of hardness increase with the increase for the weight percentage of reinforcing particles and fibers, while the wear rate decrease with the increase the load level of the reinforcing particles and fibers . The largest value of the hardness, and the lowest value of the wear rate for epoxy reinforced with 20% of SiO2, the wear rate increase in general with increasing the applied load.
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show More