Preferred Language
Articles
/
jeasiq-566
THE USE OF SIMULATION AND LINEAR PROGRAMMING IN THE PLANNING OF AUDIT WORK (An Empirical Study in the Office of Financial Supervision)
...Show More Authors

Research includes three axes, the first is the average estimate time of achievement (day) to work oversight, to five supervisory departments in the Office of Financial Supervision Federal and then choose the three control outputs and at the level of each of the five departments above, and after analyzing the data statistically back to us that the distribution of the times of achievement It is the exponential distribution (Exponential Distribution) a parameter (q), and the distribution of normal (Normal Distribution) with two parameters (μ, σ2), and introduced four methods of parameter estimation (q) as well as four modalities parameter to estimate (μ) consistently (σ2), it was estimated average completion time for each of the (q) and (μ), and is considered each random variable has the distribution of initial potential is a function of the average number of sergeants (C), was a comparison between these modalities advantage in the practical side through simulation method using the Monte Carlo method ( Monte Carlo), and a number of users is important statistical measure of the experiences of the average error boxes (MSE) (Mean Square Error), it was in general to reach a good estimate (which has the lowest value of the average error boxes (MSE)) for each type of the three outputs regulatory and the level of all sizes samples (departments subject to regulatory scrutiny PET), and this is the estimated average is the optimum time for the completion of each type of audit reports and the corresponding optimal number of sergeants to accomplish this report.

The second axis of research is planning to set a timetable for the completion of outputs control for the year 2009, as the table's goal is planning the completion of types of audit reports to chapters of the annual plan, and access to the optimum number for the completion of each type of reports as well as the regulatory power optimum (h / Sergeant) in order to be deviation ratios for the completion of the regulatory reporting less as possible by using linear programming, and after the implementation of the models on the program (TORA2006) reached an optimum number to complete the audit reports of various kinds, and each department of supervisory departments, according to the available resources as well as potential regulatory optimum (h / Sergeant) per season .

Finally, the third axis, which included the proposal forms to improve the audit work, the first was (AWP circuits regulatory form for the period from 1/1/2009 until 31/12/2009), and the second (plan and follow up the inputs and outputs of the completion of audit work on the regulatory departments and bodies of the level of form ), which serves as compensation for five types of questionnaires prepared by the Department of Planning and Follow-up in the Office of Financial Supervision.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
2013 Ieee International Conference On Circuits And Systems (iccas)
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
...Show More Authors

The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Sat Dec 04 2021
Journal Name
Ournal Of Global Trends In Pharmaceutical Sciences
REVIEW ARTICLE: COVID – 19: INFECTION, ORIGIN, TRANSMISSION, DIAGNOSIS, TESTS AND TREATMENT OPTIONS
...Show More Authors

Publication Date
Thu Aug 14 2025
Journal Name
Journal Of Physical Education
Special Endurance And its Relationship With 10 Km Walking Achievement for Youth
...Show More Authors

View Publication
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Design and Implementation for optical fiber communication system using frequency shift coding
...Show More Authors

In this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Iosr Journal Of Computer Engineering
Lossy Image Compression Using Wavelet Transform, Polynomial Prediction And Block Truncation Coding
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Karbala Journal Of Medicine
Open Tibial Shaft Fractures Treated By Primary External Fixation And Bone Graft
...Show More Authors

Eprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is

... Show More
Publication Date
Mon Oct 06 2014
Journal Name
Plos One
Hepatic Carboxylesterase 1 Is Induced by Glucose and Regulates Postprandial Glucose Levels
...Show More Authors

View Publication
Scopus (34)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sat Oct 31 2020
Journal Name
Iraqi Journal Of Agricultural Sciences
RELATIONSHIP BETWEEN PIGMENTS PRODUCTION AND BIOFILM FORMATION FROM LOCAL PSEUDOMONAS AERUGINOSA ISOLATES
...Show More Authors

The current study was designed to explore the association between the pigments production and biofilm construction in local Pseudomonas aeruginosa isolates. Out of 143 patients suffering from burns, urinary tract infections (UTI), respiratory tract infections and cystic fibrosis obtained from previous study by Mahmood (2015), twenty two isolates  (15.38%) were identified  from (11) hospitals in Iraq, splitted  into three provinces, Baghdad, Al-Anbar and Karbala for the duration of June 2017 to April 2018.  Characterization was carried out by using microscopical, morphological and biochemical methods which showed that all these isolates belong to P. aeruginosa.  Screening of   biofilm production isolates was carried out by usi

... Show More
Preview PDF
Scopus (5)
Scopus Clarivate Crossref