Information Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology that Include {Electronic Purchasing and Electronic Marketing}. We Depended Upon Case Study and Check List; we got from then the Data and the Needed Information to be analyzed to reach the result of this Search. This Search Reached a Very Important Conclusion that Include the Existence of role of Information Network Technologies in Application of Information Technology. This Search Recommend that the Company must Special Attention to Internal Network (Intranet) as well as given a Great Role to Information Technology Application Represented in (Electronic Purchasing and Electronic Marketing).
Volterra – Fredholm integral equations (VFIEs) have a massive interest from researchers recently. The current study suggests a collocation method for the mixed Volterra - Fredholm integral equations (MVFIEs)."A point interpolation collocation method is considered by combining the radial and polynomial basis functions using collocation points". The main purpose of the radial and polynomial basis functions is to overcome the singularity that could associate with the collocation methods. The obtained interpolation function passes through all Scattered Point in a domain and therefore, the Delta function property is the shape of the functions. The exact solution of selective solutions was compared with the results obtained
... Show Moreتعد البرمجة الخطية عاملاً مؤثراً وفعالاً في عملية صنع و إتخاذ القرار عندما تكون الموارد متاحة أو متوفرة لكي تعطي أهدافاً معينة ، وتكمن البرمجة الخطية في حل وتقييم الانشطة أو الفعاليات عند تطبيق إحدى أدواتها وهي الطريقة المبسطة العامة ، التي يكون فيها الحل مقبولاً (ممكناً) ويجب التوصل الى الحل الامثل عندها تسمى بالطريقة المبسطة الاولية أو يكون الحل فيها أمثلاً ويجب التوصل الى الحل الم
... Show MoreThis research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreFraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
In this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.
... Show More
إن التطور الهائل في منظومة تكنولوجيا المعلومات والاتصالات في العالم , أثر كثيراً في الجوانب الحياتية والاجتماعية والاقتصادية والسياسية والثقافية عامة والتربوية والتعليمية خاصة, إذ أصبح لها دور كبير في تسيير الكثير من الأمور. ولا بد من القول ان المؤسسات والمنظمات لا يمكن ان تنتقل من القرن العشرين الى القرن الحادي والعشرين إلا إذا أفادت من تكنولوجيا المعلومات والاتصالات, إذ توافر هذه التكنولوجيا الكثير من ال
... Show Moreالمستخلص
، ( اب ( ١٩٢٢ ô یدتھ ارض الیب ô ي قص ô وت ،ف ô زي الی ô اعر الانجلی ô یھدف ھذا البحث الى بیان مدى تأكید الش
ن ô ة م ô ان والطبیع ô ین الانس ô ت ب ô ا ربط ô ي لطالم ô ة ،الت ô على الحاجة الملحة للانسان الحدیث لاسترجاع الصلة الحمیم
ة ô ي بمثاب ô ة ھ ô ان الثلاث ô ذه الارك ô ین ھ ô ة ب ô ة الموثق ô ذه العلاق ô رى .ان ھ ô ة اخ ô ن جھ ô جھة ، وبین الانسان والاسطورة م
ات ô ي الثقاف ô ة ف ô وس الدینی ô وبة والطق ô اطیر الخ
The expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset w
... Show More