Preferred Language
Articles
/
jeasiq-566
THE USE OF SIMULATION AND LINEAR PROGRAMMING IN THE PLANNING OF AUDIT WORK (An Empirical Study in the Office of Financial Supervision)
...Show More Authors

Research includes three axes, the first is the average estimate time of achievement (day) to work oversight, to five supervisory departments in the Office of Financial Supervision Federal and then choose the three control outputs and at the level of each of the five departments above, and after analyzing the data statistically back to us that the distribution of the times of achievement It is the exponential distribution (Exponential Distribution) a parameter (q), and the distribution of normal (Normal Distribution) with two parameters (μ, σ2), and introduced four methods of parameter estimation (q) as well as four modalities parameter to estimate (μ) consistently (σ2), it was estimated average completion time for each of the (q) and (μ), and is considered each random variable has the distribution of initial potential is a function of the average number of sergeants (C), was a comparison between these modalities advantage in the practical side through simulation method using the Monte Carlo method ( Monte Carlo), and a number of users is important statistical measure of the experiences of the average error boxes (MSE) (Mean Square Error), it was in general to reach a good estimate (which has the lowest value of the average error boxes (MSE)) for each type of the three outputs regulatory and the level of all sizes samples (departments subject to regulatory scrutiny PET), and this is the estimated average is the optimum time for the completion of each type of audit reports and the corresponding optimal number of sergeants to accomplish this report.

The second axis of research is planning to set a timetable for the completion of outputs control for the year 2009, as the table's goal is planning the completion of types of audit reports to chapters of the annual plan, and access to the optimum number for the completion of each type of reports as well as the regulatory power optimum (h / Sergeant) in order to be deviation ratios for the completion of the regulatory reporting less as possible by using linear programming, and after the implementation of the models on the program (TORA2006) reached an optimum number to complete the audit reports of various kinds, and each department of supervisory departments, according to the available resources as well as potential regulatory optimum (h / Sergeant) per season .

Finally, the third axis, which included the proposal forms to improve the audit work, the first was (AWP circuits regulatory form for the period from 1/1/2009 until 31/12/2009), and the second (plan and follow up the inputs and outputs of the completion of audit work on the regulatory departments and bodies of the level of form ), which serves as compensation for five types of questionnaires prepared by the Department of Planning and Follow-up in the Office of Financial Supervision.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Preparation and diagnosis rules Leno complexes with Ortho Hyderoxa Benzldaaan
...Show More Authors

I attended the new chief base of bilateral interaction Para Amino like 1 Phenyl 4 Bayrosolin 5 Online with Alsalesl Aldehid someone Allicand by careful analysis of the elements and infrared spectrum

View Publication Preview PDF
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
Lipid Profile Parameters and Adipokines among Adolescents Infected with Toxoplasmosis
...Show More Authors

The lipid profile and adipokines of an adolescent may be affected by some parasite infections. Recently, it has been discovered that these parasites are connected to body mass index (BMI), lipids and adipokines. The current study, therefore, aimed to specify how Toxoplasma gondii (T. gondii) affect BMI, lipid profile and adipokines. This study was conducted in Al Madain hospital, Baghdad from October to December 2022. An ELISA test was performed to examine the anti-T. gondii IgG and IgM for a group of adolescents attending the hospital. Based on this examination ninety adolescents were chosen to be involved in the study. They were separated in to two groups: individuals who tested positive for the parasite (n=45) and those who teste

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Psychicasthein and Its Relationship Family Violence among Secondary School Student
...Show More Authors

The recent research aims to the following
1- Identify the for Psychicasthein high school students
2-Identify the differences of Psychicasthein of high school students according tothe (male, female).
3- Identify the for Family Violence high school students .
4-Identify the differences of Family Violence of high school students according to the ( male,female)
5-Identify of the relationship between the Psychicasthein and family violence
To achieve the objectives of the present research was to build Psychicasthein scale and the adoption of a measure of domestic violence, and applied these tools, and after extracting the psychometric properties of the two measures of reliability and validity, according to a sample of 200 stu

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 23 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Periodontal health and salivary Interleukin -6 among preterm postpartum women
...Show More Authors

Background: Hormonal changes during pregnancy have been suggested to predispose women to gingivitis. Furthermore, advance periodontal infection in pregnant women may pose a threat to the placenta and uterus and may increase the like hood of preterm delivery. The aim of this study was to investigate the effect of salivary interleukin -6 (IL-6) level and periodontal health among preterm postpartum women. Materials and Methods: Salivary samples were taken from 33 preterm postpartum women (study group) and 33 full term postpartum women (control group). The supernatant salivary samples were assayed using atomic absorption spectrophotometer. Plaque, calculus and gingival indices were used for recording the oral hygiene and gingivitis also probing

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Journal Of Engineering
Water Hammer Arresters; Review Studies and Practical Experiments for Alternatives
...Show More Authors

The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe

... Show More
Publication Date
Wed Jul 02 2014
Journal Name
Journal Of The Faculty Of Medicine
Unintended durotomy during degenerative lumbar Spine surgery (Incidence and management
...Show More Authors

AW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3

View Publication
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
3-D OBJECT RECOGNITION USING MULTI-WAVELET AND NEURAL NETWORK
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref