Preferred Language
Articles
/
jeasiq-423
Evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption
...Show More Authors

 Abstract

It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their behavior to diagnose and combat financial and administrative corruption and on an ongoing basis and that hurt thus in the development of their performance and the performance of the office . The problem with research in non-weakness attention to training programs for the diagnosis of the phenomenon of financial and administrative corruption based on the lack of evaluation of the reactions of trainees and their learning and their behavior and the consequences, while the importance of research lies in the attention to those programs and the promotion of Its foundations to have a significant role in the diagnosis of the phenomena of financial and administrative corruption, either goal Search represents in the evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption and shared by the inspector general of the Ministry of Finance office and stand on the strengths and weaknesses. The researcher used the resolution as a key tool for gathering information, in addition to the personal interviews conducted by the researcher with the relationship owners, as well as relying on records and annual reports to the Inspector General Office of the Ministry of Finance of the research sample, has Included sample (78) employees received the special administrative and financial corruption within the training programs or outside of Iraq, and has processing that data using statistical the package (SPSS) and the use of some statistical methods for data processing Amid Account arithmetic mean, standard deviation, and coefficient of variation, for the purpose of Z, and analysis as well as test the contrast unilateral analysis to test the moral differences hypothesis has the researcher to inter of the conclusions the most important of the lack of interest Office of the Inspector General of the Ministry of Finance assessed the reactions of trainees to the training programs as well as the counting taking into consideration the degree earned by the employee when the training is completed to measure winning his learning, The most important recommendations were alerted researcher on the interest in programs for administrative and financial corruption and given training as well as the important work on the evaluation of those programs to find out the strengths and weaknesses.

Crossref
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
International Journal Of Contemporary Mathematical Sciences
Approximation by Convex Polynomials in Weighted Spaces
...Show More Authors

Here, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity

Publication Date
Fri Jan 01 2016
Journal Name
Basrah Journal Of Science
Nearly Maximal Submodules
...Show More Authors

Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Minimally invasive access cavities in endodontics
...Show More Authors

Background: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using TD-ABC technology to determine idle production capacity: An applied research in Al-Wasat Oil Company
...Show More Authors

The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weakly Nearly Prime Submodules
...Show More Authors

        In this article, unless otherwise established, all rings are commutative with identity and all modules are unitary left R-module. We offer this concept of WN-prime as new generalization of weakly prime submodules. Some basic properties of weakly nearly prime submodules are given. Many characterizations, examples of this concept are stablished.

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Multicomponent Inverse Lomax Stress-Strength Reliability
...Show More Authors

In this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
On y-closed Dual Rickart Modules
...Show More Authors

In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref