Preferred Language
Articles
/
jeasiq-470
Entry cost based on activity-based cost specifications and comparative study
...Show More Authors

Several recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from the Approaches (ABC) and (ABCII), and research aims mainly to indicate the role of the Attribute Based Costing Approach to provide the most accurate cost information compared to the Activity Based Costing Approach It works to meet the needs and desires of customers as the application starts by identifying customer specifications and characteristics desired by the customer in the product.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Using of digital media and its effect on constructing the value system of Iraqi society (Field study on a sample of the audience for the city of Baghdad model)
...Show More Authors

With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 11 2006
Journal Name
Iraqi Journal Of Laser
In vivo N2 Laser Effect on Lymphocyte Transformation Capacity and Phagocytosis Activity in Mice
...Show More Authors

The objective of this in vivo study is to investigate the effects of 337.1 nm pulsed N2 laser on cellular immune response represented by lymphocyte transformation capacity and phagocytosis activity in laboratory animals. The samples include 60 adult male BALB/c mice, were divided into control group and experimental groups. The experimental groups were divided into two main groups according to the time period after N2 laser irradiation. Each group was divided into 9 subgroups which exposed to N2 laser radiation at different values of pulse repetition rates and exposure times. The results of immunological tests demonstrated that the exposure to 180 J/cm2 of N2 laser radiation induce adverse effect to cellular immune response. The results o

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation Status Of Central Laboratories In Al- Kadhimya Teaching Hospital According To ISO/IEC 17025 In 2005
...Show More Authors

This research aims to analyze and evaluate  the reality of the total quality management for the central laboratories by comparing systems of work in the laboratories of Al- Kadhimiya Didactic Hospital with the requirements of ISO 17025 to determine the degree of compatibility and the willingness to adapt to the requirements of the above specification and to show the ability of building an applicable quality management system and to identify problems and their mitigations and prevention to increase.

This study gains its importance from the importance of the labs which stems from the fact that the process of health is a set of interrelated activities, Medical examinations and tests con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 04 2014
Journal Name
Iraqi National Journal Of Chemistry
Comparative Study for Antibacterial Activity of Some Maleamic acid Derivatives with Some Commercial Antibiotic
...Show More Authors

Publication Date
Wed Aug 30 2023
Journal Name
مجلة نسق
The Effectiveness of a Program Based on the Theory of the Five Minds in Developing Focused Reading and Extensive Reading Skills among Second-Year Middle School Students
...Show More Authors

View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
International Journal Of Nanoscience
Fabrication and Enhancement of Organic Photodetectors Based on Iron Phthalocyanine Films
...Show More Authors

Iron–phthalocyanine (FePc) organic photoconductive detector was fabricated using pulsed laser deposition (PLD) technique to work in ultraviolet (UV) and visible regions. The organic semiconductor material (iron phthalocyanine) was deposited on n-type silicon wafer (Si) substrates at different thicknesses (100, 200 and 300) nm. FePc organic photoconductive detector has been improved by two methods: the first is to manufacture the detector on PSi substrates, and the second is by coating the detector with polyamide–nylon polymer to enhance the photoconductivity of the FePc detector. The current–voltage (I–V) characteristics, responsivity, photocurrent gain, response time and the quantum efficiency of the fabricated photoconduc

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus