Preferred Language
Articles
/
jeasiq-132
The influence of human resources Accounting on cost reduction
...Show More Authors

The development of human resources training programs has an applied and important role in the preparation of human cadresin terms of capacity to absorb technical sciences and skills and scientific and practical practices at faster rates in order to bealighed with continous development. Hence the recognition of the significant role that human resources play in the economy of any country,which has stressed the interest towards the economic unity of the qualified staff that it needsin atimely manner through the ongoing training process in the era of high technology day by  day  In this regard ,the current research deal with accounting of human resources and its impact on reducing costs in the military establishment and then the realit of training and development in this institution.  finally ,we have come into the conclusions and recommendatios ,the most important conclusions is that if the military cadets are trained by acadre from within the institution ,the training costs do not appear.The Iraqi training staff dues not receive any fees for this training. The members are also sent to courses outside the country in order to develop them and raise their competences where the Foreign wages in hard currency for each member trained. The most important recommendations are that human resources is awealth not only for the economic units but for the state itself and all that has been up graded skills led to contribute to economic progress and also stressed the need to train qualified Iraqi cadres outside the country for the purpose of development and benefit from their experience in training associates within the country,in providing the cost of foreign trainer.              

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Oriental Journal Of Chemistry
Diagnosis, Structure, and In vitro Antimicrobial and Antifungal Evaluation of some Amino benzoic acids, derived Ligand Schiff base and their Mixed Complexes with Cu(II), Hg(II), Mn(II), Ni(II) and Co(II)
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Charact'erizatio.n of new Schiff base ligand [(2-{1-[(2 hydraxy­ benzylidene)-hydrazono]-ethyl} benzene-I, 3, 5--triol.] and it's CQmp.lexes. with Co en\ Ni . (U),, c·u(U)' and · zn(II).
...Show More Authors

The eaction  of 2 4 .6-trihydroxyactophenonemonohydra1e  with

l hydr.azine monohydrate was realized ti·nder reflu.(( in methanol and i:l.

Jew drops of glacial acetic acid we.re added to give lhe'(int rmediate)

2-(1hydr pno-ctbyt)-benzcne-·1.3.5-r:Qql,       which      reacted     wittl

saEcy.laldehyde. jn methm)ql to gjy;e 'a new :tyRe CNzOi) Ligand  (H:flL]

f(2-{1-[(2-=bydroxy-bertzylide·ne)-bydrazqoo,J-e·thy.1}bcnze·neJ ;3·,5

of

 

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Theoretical Study, and Biological Evaluation of Some Metal Ions with Ligand "Methyl -6-[2-(4-Hydroxyphenyl) -2-((1-Phenylethylidene) Amino) Acetamido] -2,2-Dimethyl-5—Oxo-1-Thia-4-Azabicyclo [3.2.0] Heptane-3-Carboxyylate
...Show More Authors

Schiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Amino Acids as Environmentally-Friendly Corrosion Inhibitors for 2024 Aluminium Alloy in Akaline Medium
...Show More Authors

The corrosion behavior of 2024 aluminium alloy was investigated in alkaline medium (pH=13) containing 0.6 . in absence and presence of different concentrations of three amino acids separately [Methionine, Glutamice acid and Lysine] as environmentally friendly corrosion inhibitors over the temperature range (293-308)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency increased with an increase of the inhibitor concentration but decreased with increase in temperature . The maximum efficiency value was found with lysine =80.4 of 293 k and 10 . concentration of lysine. The adsorption of the amino acids was found to obey Langmuir adsorption isotherm . Some thermodynamic parameter âˆ

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref