In the name of God the Merciful
Praise be to God and the Hall and Peace Uncle Prophet Muhammad and blindness Alo and companions
Money is the lifeblood and a reason for living. An individual cannot live without money to make it
It is only through the necessities of life and the state that it can perform its duties and functions only
As money is so important, the state must regulate the balance of revenues
And expenses in order to avoid failure in Mizanitia, but perhaps the country may be exposed to crises
An exception that leads to misappropriation in the general Mizanitia and the Islamic Shari'ah is valid for Makkah
Time and place for all circumstances has created several ways to address the budget deficit
General to the state, it has authorized the state to impose taxes and loans, accelerate zakat and sell and rent your property
The state and donations to fill the deficit in Mizanitia, God has ensured to preach in this religion everything
Dino and Deniah allow.
هدف هذا البحث الى التعرف على أثر فاعلية تكنولوجيا التحول الرقمي في تحسين كفاءة الخدمة التأمينية في شركات التأمين العامة في العراق من خالل تكنولوجيا التحول الرقمي في العملية التأمينية "الترويج لمنتج التأمين,تقديم طلب التأمين,االكتتاب ,تسوية الخسائر" ولتحقيق هذا الهدف تم تصميم استمارة استقصاء وزعت في المجتمع المبحوث والتي تمثل متخذي القرار في الشركات المبحوثة قيد البحث وكان من اهم نتائج البحث وجود عالقة بين ا
... Show MoreThe aim of the research is to demonstrate the importance of leadership empowerment in its dimensions (knowledge, participation in decision-making, incentives, trust between the leader and subordinate, delegation of authority and communication) and its impact on enhancing the effectiveness of the company in its dimensions Represented by (achievement of objectives, quality of insurance service, adaptation to work environment and job satisfaction), by adopting the questionnaire as a main tool in collecting data from officials in the National Insurance Company, numbering (56) surveyed in job sites (section manager, division official and unit official) Their answers were analyzed using the SPSS statistical program in calculating the a
... Show MoreThe aim of the research is to diagnose the methods of enhancing the value of citizenship in children through the interactive life process in educational institutions; the descriptive approach was used to achieve the objective by identifying social theories that corresponded to the national value or the theoretical principles of citizenship education. The study focused on educational activities and their role in establishing values, national educational philosophy in interactive activities, as well as the presentation of previous studies on the subject of citizenship, and maps of each of the strategies of active learning, skills in the process of interactive life in the field of education, Institutions that have the responsibility to prom
... Show MoreThe competition in the hotel sector, globalization and the development of new information have forced the sector to continuously seek new techniques and arrangements to remain competitive through hotel industry companies, including Benchmarking and the application of this method in the hotel sector. The selection of the Rashid International Hotel by the Ministry of Tourism as a leading hotel or benchmark for comparison of other hotels in Iraq, and the selection of two hotels in Baghdad for comparison, namely (Ishtar International Hotel, Baghdad International Hotel) and the choice also by the Ministry of Tourism, N is to correct the course of practice to manage the cost and diagnosis of the weakness of the strengths and weaknesses in the
... Show MoreLeap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreAn Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More