The Life Cycle and Larval Development of Neoechinorhynchus iraqensis (Acanthocephala: Neoechinorhynchidae) in the Intermediate Host
This research seeks to clarify the regulatory and educational role of the regulatory and educational institutions in reducing the phenomenon of financial and administrative corruption as a dangerous phenomenon of the communities, as it touched search kinds of financial and administrative corruption and the causes and effects, as well as to the role of educational institutions in reducing this phenomenon, and finally between experiments some SAIs and accounting Arab and foreign countries on how to reduce the phenomenon of financial and administrative corruption.The research aims to several targets which shed light on the role of educational and supervisory institutions in reducing corruption, a statement origins and evolution of and justi
... Show MoreTheresearch took the spatial autoregressive model: SAR and spatial error model: SEM in an attempt to provide a practical evident that proves the importance of spatial analysis, with a particular focus on the importance of using regression models spatial andthat includes all of them spatial dependence, which we can test its presence or not by using Moran test. While ignoring this dependency may lead to the loss of important information about the phenomenon under research is reflected in the end on the strength of the statistical estimation power, as these models are the link between the usual regression models with time-series models. Spatial analysis had
... Show MoreThe paper uses the Direct Synthesis (DS) method for tuning the Proportional Integral Derivative (PID) controller for controlling the DC servo motor. Two algorithms are presented for enhancing the performance of the suggested PID controller. These algorithms are Back-Propagation Neural Network and Particle Swarm Optimization (PSO). The performance and characteristics of DC servo motor are explained. The simulation results that obtained by using Matlab program show that the steady state error is eliminated with shorter adjusted time when using these algorithms with PID controller. A comparative between the two algorithms are described in this paper to show their effectiveness, which is found that the PSO algorithm gives be
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreAbstract:
The paper aims to measure an aggregated banking stability index reflecting the degree of stability of the banking system to help policy makers to take the necessary actions to avoid financial crises facing banks and to achieve a banking system with high efficiency in terms of banking risk.
Therefore, the problem of paper is that the Central Bank of Iraq did not seek until 2016 to build a aggregated index for the purpose of identifying the stability of the banking situation in Iraq, but rather on the adoption of scattered indicators, which depend on the mechanism of relative changes in those indicators for the purpose of identifying the situation of b
... Show MoreObjective: This project aimed to study the morphological description and histological structure of ileum in Iraqi black partridge (
The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.
The effective application of the method of measuring and evaluating performance according to the Balanced Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.
The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non
... Show More