The photoconductivity and its dependence on light intensity have been investigated in a-Ge20Se80 thin films as a function of temperature between (293–323)K. The result showed that the photoconductivity and photosensitivity increase with increase of annealing temperature. This behavior is interpreted in terms of the dispersive diffusion –controlled recombination of localized electrons and holes.
Purpose: This study's objective is to assess this relationship in the context of the banking industry in Iraq. The human resources management practices (HRMPs) Theoretical framework: in this study included recruiting and selection, training and development, performance appraisal, compensation and reward to testing relationship HRMPs. Design/methodology/approach: in this study; We analysed by used a quantitative approach, and 246 employees were selected as a sample and given a questionnaire. The SPSS software was used to examine the data that were obtained from the questionnaire. Findings: The study's findings revealed a variety of hypotheses and conclusions, including the following: comp
... Show MoreVocational education has great importance to comprehensive national development as it provides intermediate cadres able of operating the factories and laboratories in the farms and fields beside the work in the fields of health, service, administration and commercial. Due to the importance of this type of education in society, it is necessary to do a qualitative reform of vocational education in order to make the educational staffs get the necessary basic expertise to adapt the requirements of the labor market and try to rearrange and organize the workforce through put long-term economic and social policy through certain planning open to the workforce. The workforces structure according to gradual expansion in all the national ec
... Show MorePurpose: In view of the trend toward using international financial reporting standards when generating financial statements, we looked at the interaction between audit services and non-audit services for auditors in the context of actuarial services for insurance firms. CPAs are authorized to work in banks and insurance businesses, but those with a practicing license obtained after earning a higher academic degree are not. Design/methodology/approach: A small number of auditing firms control the decisions issued by the Iraqi Accountants Association, monopolizing audit services in banks and insurance businesses. In the case of actuarial services used in reserve estimation, they are credited to an external party's account withou
... Show MoreThe cancer is one of the biggest health problems that facing the world . And the bladder cancer has a special place among the most spread cancers in Arab countries specially in Iraq and Egypt(2) . It is one of the diseases which can be treated and cured if it is diagnosed early . This research is aimed at studying the assistant factors that diagnose bladder cancer such as (patient's age , gender , and other major complains of hematuria , burning or pain during urination and micturition disorders) and then determine which factors are the most effective in the possibility of diagnosing this disease by using the statistical model (logistic regression model) and depending on a random sample of (128) patients . After
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More