Cost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles
مكانية استخدام السوق المالية في التنبؤ بالدورات الاقتصادية
استخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي
The study of the relationship between the coordinates of the sun and the moon with the crescent visibility factors has not been previously treated in a detailed and accurate way in research and previous studies, despite its religious importance. Accordingly, this paper aims to study the relationship between the crescent visibility factors (age, lag time, elongation (ARCL), arc of vision or relative altitude (ARCV), relative azimuth (DAZ), and crescent width (W), with coordinates of the sun and the moon), and how it varies during the day of the crescent's observation. In this paper, Matlab programs were designed to calculate the ecliptic sun and moon coordinates (λ, β) and in the presence of all perturbation impacts (planets), th
... Show MoreThe tax base is one of the bases of the technical organizing of taxes, and that a good selection of the tax base effects the outcome of the tax and its fairness, and with the expansion of the tax range results a dangerous phenomenon called tax evasion, which became threaten the economies of countries and this phenomenon prevents the achievement of the state to its economic, political and social objectives which seeks to resolve this phenomenon and identifying all human and material potential and realize the real reasons that lie behind it. The researcher found that tax authorities are weak in terms of it the technical material and financial abilities, the analysis of data show that then is a significant reve
... Show MoreIn this study, the fission track registration technique with the CR-39 detector are using to determination the uranium concentrations for seventeen samples of teeth distributed in four districts in Baghdad City .Five samples taken from both Al-Durra District and Al-Jadiriyia District, Four samples taken from Al-Karrda (Alaatar street) Taken four samples and three samples taken from Al-Zuafrania and by 0.5gm in weight and 1.5 mm in thickness. The uranium concentrations in teeth samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U) with thermal neutrons from (241 Am-Be) neutron source that has flux of (5 ×103 n cm-2 s-1). The concen
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThe current study aimed to isolate and diagnose the fungi associated with the inflammatory bowel disease patients with 150 samples distributed between 50 samples from Crohn's patients and 50 samples from ulcerative colitis patients, 50 control from Al-Kindy Al Teaching Hospital in Baghdad, Baghdad. Five types of yeast were isolated and identified, namely C. albicans, C.glabarta, Tropicales, C. parapsilosis, C. and C., krusi C. parapsilosis and.and Aspergillus, Penicillium, Muocer, Rhizopous, Saccharomycosis, and Cryptococcus, The results indicated the dominance of Candida spp. In crohn’s disease, the frequency of isolated Candida albicans was 24 (58.54%), Candida glabrata 11 (26.86%), Candida tropicalis 5 (12.2%) and Candida krusi was 1 (
... Show More