Preferred Language
Articles
/
jeasiq-668
Budget Programs and Performance away to enhance the control in government economic units
...Show More Authors

     The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.                               

        Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature  show its importance in strengthening financial and operationl control over the government transactions though its dependence on the formation of the programs you want governmant units the promote implementation and asset of performance standards that can be adopted on the subject of evaluating the performance of personnel and units in general package.                                                               

 This study has reached a set of conclusions we will mention the most important:

That the style of the budget programs and performance is based reclassification of public expenditure so that matdzh units of government show business and matqon activities and though the indentification of costs and there by to reduce cost , as well as help to complete the process of effective control and pay attention to what has been accomplished .                                               

   The study has find the following  :     

 1-  Application programs need to adopt the budget programe and performance by the ministry of public and accounting service in the preparation of the state budget because they are based on scientific foundation and the process of the preparation of estimates which achieve the objectives of future programs and impose controls on government spending.                                          

2- To achieve the first and the most important functions of the budget position which is planning and control must be converted from traditional programs to balance the budget and programe and performance where traditional budget.                                     

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Nearly Pseudo Quasi-2-Absorbing submodules(I)
...Show More Authors

The concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Some Geometric Properties for a Certain Class of Meromorphic Univalent Functions by Differential Operator
...Show More Authors

The major target of this paper is to study a confirmed class of meromorphic univalent functions . We procure several results, such as those related to coefficient estimates, distortion and growth theorem, radii of starlikeness, and convexity for this class, n additionto hadamard product, convex combination, closure theorem, integral operators, and  neighborhoods.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of ri

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
...Show More Authors

The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Nearly Pseudo Quasi-2-Absorbing Submodules (II)
...Show More Authors

The concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules was recently introduced by Omar A. Abdullah and Haibat K. Mohammadali in 2022, where he studies this concept and it is relationship to previous generalizationsm especially  2-Absorbing submodule and Quasi-2-Absorbing submodule, in addition to studying the most important Propositions, charactarizations and Examples. Now in this research, which is considered a continuation of the definition that was presented earlier, which is the Extend Nearly Pseudo Quasi-2-Absorbing submodules, we have completed the study of this concept in multiplication modules. And the relationship between the Extend Nearly Pseudo Quasi-2-Absorbing submodule and Extend Nearly Pseudo Quasi-2-Abs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Benchmarking Framework for COVID-19 Classification Machine Learning Method Based on Fuzzy Decision by Opinion Score Method
...Show More Authors

     Coronavirus disease (COVID-19), which is caused by SARS-CoV-2, has been announced as a global pandemic by the World Health Organization (WHO), which results in the collapsing of the healthcare systems in several countries around the globe. Machine learning (ML) methods are one of the most utilized approaches in artificial intelligence (AI) to classify COVID-19 images. However, there are many machine-learning methods used to classify COVID-19. The question is: which machine learning method is best over multi-criteria evaluation? Therefore, this research presents benchmarking of COVID-19 machine learning methods, which is recognized as a multi-criteria decision-making (MCDM) problem. In the recent century, the trend of developing

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Crossref