Preferred Language
Articles
/
jeasiq-160
Developing the investment budgeting through evaluation of investment projects
...Show More Authors

The aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future projects. For the project and its implementation will contribute to the improvement of its preparation), and has been applied research in the laboratory opening, one of the laboratories of the General Company for Sufism industry.  The researcher reached a number of conclusions, the most important of which is that the investment projects prepared by the company were not evaluated later after the implementation of the project and the company's lack of commitment to the model prepared by the Ministry of Planning to prepare investment projects,  In the light of the conclusions, the researcher recommends the need to evaluate the investment projects after the investment budgeting and implementation of the project for the evaluation of the importance of avoiding future errors and improve budgeting, as well as on the company following the form prepared by the Ministry of planning for its role in rationalizing investment projects.                                                                                           

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 14 2023
Journal Name
Iraqi Journal Of Science
Characterizing Jordan Higher Centralizers on Triangular Rings through Zero Product
...Show More Authors

n this paper , we prove that if T is a 2-torsion free triangular ring and be a family of additive mapping then satisfying is a higher centralizer which is means that is Jordan higher centralizer on 2-torsion free triangular ring if and only if is a higher centralizer and also we prove that if be a family of additive mapping satisfying the relation Σ , Then is a higher centralizer.

View Publication Preview PDF
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus Clarivate Crossref
Publication Date
Thu Oct 24 2024
Journal Name
Applied Water Science
Tectonic activation and the risk of Ilisu Dam collapse to Iraq through modelling and simulation using HEC-RAS
...Show More Authors
Abstract<p>Floods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.</p><p>The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result</p> ... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Removal of Ciprofloxacin Antibiotic from Synthesized Aqueous Solution Using Three Different Metals Nanoparticles Synthesized Through the Green Method
...Show More Authors

This study investigates the possibility of removing ciprofloxacin (CIP) using three types of adsorbent based on green-prepared iron nanoparticles (Fe.NPs), copper nanoparticles (Cu. NPS), and silver nanoparticles (Ag. NPS) from synthesized aqueous solution. They were characterized using different analysis methods. According to the characterization findings, each prepared NPs has the shape of a sphere and with ranges in sizes from of 85, 47, and 32 nanometers and a surface area of 2.1913, 1.6562, and 1.2387 m2/g for Fe.NPs, Cu.NPs and Ag.NPs, respectively. The effects of various parameters such as pH, initial CIP concentration, temperature, NPs dosage, and time on CIP removal were investigated through batch experiments. The res

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Radiological Impact Assessment of Farm Soils and Ofada rice (Oryza sativa japonica) from Three Areas in Nigeria
...Show More Authors

Oryza sativa japonica (ofada rice) is largely grown in Aramoko, Abakaliki and Ofada are communities and consumed by both the poor and rich in Nigeria. A total of twenty ofada rice farmlands were identified in each study area and rice samples were randomly collected, thoroughly mixed to make a representative sample from each farmland. Soil samples were collected in each farm to a depth of 5-15cm from at least eight different points and thoroughly mixed together to form a representative sample. The samples were thereafter taken to the laboratory for preparation and spectroscopic analysis. A well-calibrated NaI(Tl) gamma-ray detector was used in spectrometric analysis of the samples and descriptive statistics was used to analyze th

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 05 2021
Journal Name
Arab Science Heritage Journal
منهج ابن واصل في تناول الغزو المغولي من خلال كتابه (مفرج الكروب في اخبار بني ايوب)
...Show More Authors

The research revolves around the methodology of the historian Ibn Wasil
(d.697 AH) in dealing with the Mongolian invasion through his book
“Mafrej al-Karroub fi Akhbar Bani Ayyub

View Publication Preview PDF
Crossref
Publication Date
Tue Oct 06 2020
Journal Name
College Of Islamic Sciences
النص القرآني في فكر توشيهيكو إيزوتسو (Toshihiko Izutsu) دراسة من خلال كتابه (الله والإنسان في القرآن)
...Show More Authors

The researcher wanted in this research to shed light on one of the epistemological readings of the Quranic text, which is the reading of the Arabized Japanese researcher (Toshihiko Izutsu) in his book (God and Man in the Qur’an) and to explain what he has and what is on it.        

The summary of the facts in which he came out is that the knowledge reading of Toshihiko towards the Qur’anic text is old in concept. The oldest people have dealt with it in their works and what their pens have learned about, except that they have eaten and studied them under many headings such as: proportionality, consistency, systems and the like in terms, and the researcher has sought thro

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref