Preferred Language
Articles
/
jeasiq-566
THE USE OF SIMULATION AND LINEAR PROGRAMMING IN THE PLANNING OF AUDIT WORK (An Empirical Study in the Office of Financial Supervision)
...Show More Authors

Research includes three axes, the first is the average estimate time of achievement (day) to work oversight, to five supervisory departments in the Office of Financial Supervision Federal and then choose the three control outputs and at the level of each of the five departments above, and after analyzing the data statistically back to us that the distribution of the times of achievement It is the exponential distribution (Exponential Distribution) a parameter (q), and the distribution of normal (Normal Distribution) with two parameters (μ, σ2), and introduced four methods of parameter estimation (q) as well as four modalities parameter to estimate (μ) consistently (σ2), it was estimated average completion time for each of the (q) and (μ), and is considered each random variable has the distribution of initial potential is a function of the average number of sergeants (C), was a comparison between these modalities advantage in the practical side through simulation method using the Monte Carlo method ( Monte Carlo), and a number of users is important statistical measure of the experiences of the average error boxes (MSE) (Mean Square Error), it was in general to reach a good estimate (which has the lowest value of the average error boxes (MSE)) for each type of the three outputs regulatory and the level of all sizes samples (departments subject to regulatory scrutiny PET), and this is the estimated average is the optimum time for the completion of each type of audit reports and the corresponding optimal number of sergeants to accomplish this report.

The second axis of research is planning to set a timetable for the completion of outputs control for the year 2009, as the table's goal is planning the completion of types of audit reports to chapters of the annual plan, and access to the optimum number for the completion of each type of reports as well as the regulatory power optimum (h / Sergeant) in order to be deviation ratios for the completion of the regulatory reporting less as possible by using linear programming, and after the implementation of the models on the program (TORA2006) reached an optimum number to complete the audit reports of various kinds, and each department of supervisory departments, according to the available resources as well as potential regulatory optimum (h / Sergeant) per season .

Finally, the third axis, which included the proposal forms to improve the audit work, the first was (AWP circuits regulatory form for the period from 1/1/2009 until 31/12/2009), and the second (plan and follow up the inputs and outputs of the completion of audit work on the regulatory departments and bodies of the level of form ), which serves as compensation for five types of questionnaires prepared by the Department of Planning and Follow-up in the Office of Financial Supervision.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Physical Education (20736452)
تأثير التدريبات التكتيكية على اللعب السريع حسب التحمل اللاهوائي في تطور السرعة لدى لاعبي كرة القدم الشباب.
...Show More Authors

View Publication
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of Educational And Psychological Researches
اثر برنامج إرشادي في تنمية بعض المفاهيم التربوية المستنبطة من بعض المواقف اليومية التي يعيشها طفل الروضة
...Show More Authors

It has became necessary helping the children to developing same of educational values which can be drawn from daily situations which the live. Especially the childhood stage is the basic building of value individual content since its establishment the societies take care of learning children and take care of them. Through their institutes which depended on, in this function. Therefore the importance of this, research is coming from the importance of this age stage and from importance and necessity of children aguirement the educational values and its development to them, and  the importance this research  coming from depending on guidance program with  new content and it is (al bum of pictures) fro

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of Educational And Psychological Researches
أثر استخدام استراتيجيتي جانيه وميرل تينسون في اكتساب المفاهيم الجغرافية والاحتفاظ بها لدى طالبات الصف الرابع العام
...Show More Authors

مشكلة البحث :-

     ظلت رغبة الانسان في المعرفة وفهم الكون الذي يعيش فيه ، ملازمة له منذ المراحل الاولى لتطور البشرية ، فالانسان بما يتمتع به من امكانات وقدرات وطاقات كامنة استطاع عن طريق تفاعله واحتكاكه الدائم والمستمر والخلاق مع البيئة المحيطة به ان يلاحظ ، ويتخيل ويتذكر ويفكر ويخطط ويبتكر ، مستفيداً من اخطائه في التعرف عليها ، وفي زيادة قدرته على التحكم فيها وتحسينها وتطويره

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 المسائل المتعلقة بالأسماء الثابتة لله (عزوجل) الواردة في (مرعاة المفاتيح شرح مشكاة المصابيح، لأبي الحسن المباركفوري (ت1414هـ).
...Show More Authors

The research deals with the issues related to the fixed names of God U, which are from a set of issues mentioned in the Book of Observations of the Keys Explaining the Mishkat al-Masbah by Abu Al-Hasan Al-Mubarakfory (d. 141 AH). It included five demands: the first of them is in proving and identifying the most beautiful names and divisions of God, and the second in the name, name and name. And the third: It was in their number, while the fourth: in deriving the names, is it suspensive or not? And Fifth: The Compilation of Allah’s Most Beautiful Names.

View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
مجلة العلوم التربوية والنفسية
معوقات تدريس المواد التربوية والنفسية في كلية التربية – ابن الهيثم من وجهة نظر أعضاء هيئة التدريس فيها
...Show More Authors

Publication Date
Mon Jul 01 2019
Journal Name
المجلة المصرية لبحوث الأعلام
دوافع تعرض طلبة أقسام اللُّغة الإنکليزية في جامعة بغداد للقنوات الفضائية الناطقة باللُّغة الإنکليزية والإشباعات المتحققة عنه:
...Show More Authors

تلخصت مشکلة هذا البحث في التعرف على الدوافع التي تقف وراء تعرض الطلبة الدارسين في أقسام اللُّغة الإنکليزية للقنوات الفضائية الناطقة باللُّغة الإنکليزية والإشباعات المتحققة عن هذا التعرض في هذا المجتمع الخاص الذي يشکل بيئة اجتماعية علمية محددة، عن طريق تطبيق نظرية الإستخدامات والإشباعات في إطار المجتمعات الخاصة، وسعى هذا البحث إلى تحقيق ثلاثة أهداف هي، قياس استخدامات لطلبة الدارسين في أقسام اللُّغة الإنک

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 04 2023
Journal Name
Arab Science Heritage Journal
المدراس الثانوية في الاعظمية ( ثانوية كلية بغداد- ثانوية الأعظمية للبنين – ثانوية الأعظمية للبنات - ثانوية الحريري للبنات) أنموذجاً
...Show More Authors

Education received the attention of the monarchy in Iraq, especially after the developments that the country witnessed after Iraq gained independence and joined the League of Nations in 1932 AD in all political, economic and cultural aspects.  In this regard, due to its distinguished geographical location, where the atmosphere, the natural environment and the religious and political standing were available, which made it a center of attraction for most Iraqi families and political figures.  Learning and pioneering the path of knowledge, so it witnessed a great prosperity in secondary education, so several important schools appeared that contributed to advancing the wheel of learning forward, including Baghdad College High Schoo

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref