Preferred Language
Articles
/
bsj-2019
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Quality of internal audit and its impact on nature, timing and procedures of external audit An investigative study of a sample of external auditors Iraqi Solidary Companies for Auditing.
...Show More Authors

           The study aims at investigating the quality of internal auditing and its impact on nature, timing, and procedures of external audit, based on international auditing standards, in particular ISA (610). The standard ISA (610) requires the external auditors to assess independence, the scope of internal audit unit, competence, and due professional care of internal auditors as indicators that reflect the quality of internal audit performance before deciding to rely on internal auditors.

The sample of this study consisted of external auditors in Iraqi Solidary Companies for Auditing. A questionnaire was distributed to them via e-mail

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of fraud detection skills in the settlement of Compensatory claims for the fire and accident insurance portfolio: An applied study in the national and Iraqi insurance companies
...Show More Authors

The research seeks to identify the impact of fraud detection skills in the settlement of compensatory claims for the fire and accident insurance portfolio and the reflection of these skills in preventing and reducing the payment of undue compensation to some who seek profit and enrichment at the expense of the insurance contract. And compensatory claims in the portfolio of fire and accident insurance in the two research companies, which show the effect and positive return of the detection skills and settlement of the compensation on the amount of actual compensation against the claims inflated by some of the insured, The research sample consisted of (70) respondents from a community size (85) individuals between the director and assistan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI: ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI
...Show More Authors

The study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Applied Mathematics And Computation
Identification of the time-dependent conductivity of an inhomogeneous diffusive material
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Concepts of statistical learning and classification in machine learning: An overview
...Show More Authors

Statistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The American Pharmacists Association
Estimating the cost of unclaimed electronic prescriptions at an independent pharmacy
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref