The research starts from studying the contractual budget, which is one of the modern trends in preparing public budgets, both operational and capital, in addition to meeting the requirements of the global trend to achieve sustainable growth in all fields, whether financial or non-financial, and tools for the contractual budget have been identified (participation contracts, planning Implementation, monitoring) and studying its impact in supporting sustainable development through its dimensions (economic, social, and environmental). The method of the questionnaire was adopted as a main tool in collecting information on research variables and distributing it to a sample of (70) individuals who dictate positions of professional responsibility to achieve sustainable development. Within the directorates of the Ministry of Housing, Construction and Public Municipalities, a number of statistical methods were used for the purpose of analyzing the data for the answers of the research sample and testing hypotheses through the help of the statistical program (SPSS) then verifying the validity of the hypothesis from which the research was launched and based on the results of the analysis the research was concluded with a set of conclusions and recommendations The most important of which is the necessity to rely on modern methods in preparing public budgets and preparing a prior plan that is considered as a guide. Adopting it in preparing public budgets in the future, in addition to strengthening the direction of sustainable development in state ministries, considering that they protect the rights of future generations from the current wealth.
Oil sector is one of the most important sectors affecting the ecological balance, as activity contributes to the oil companies to influence their working environment, both during the oil exploration and extraction process or during transfer from one place to another process. We will try through this research put an environmental audit program proposal takes into account all the financial aspects, commitment and performance, according to the laws and regulations and agreements as well as relevant international standards, was based on research on the premise that the development of an environmental proposal auditing program that includes environmental controls on oil industry phases which helps reduce or minimize environmental pollutants B
... Show MoreFingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show Moreoptical properties of pure poly(vinyl Alcohol) films and poly(vinyl Alcohol) doped with methyl red were study, different percentage prepared with constant thickness using casting technique. Absorption, Transmission spectra have been recorded in order to study the optical parameters such as absorption coefficient, energy gap, refractive index, Extinction coefficient and dispersion parameters were measured in the wavelength range (200-800)nm. This study reveals that the optical properties of PVA affect by increasing the impurity concentration.
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreIndicative supervision represents the comparison between direct intervention (acquisition, nationalism) and participation through rules.
The last financial crisis reflected our needs for different approaches of supervision consist with our goals, but the crisis reveals also number of sounds requested and pressured toward direct control (Intervention via forces) through government acquisition and nationalization.
This study attempts to deal with crisis lessons, in the field of choice between indicative and direct supervision which government authorities used to reduce the bad effect on the monetary firms.
Iraqi banks suffered from high levels of direct co
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
A total of 96 stool samples were collected from children with bloody diarrhea from two hospitals in Baghdad. All samples were surveyed and examined for the presence of the Escherichia coli O157:H7 and differentiate it from other Non -Sorbitol Fermenting Escherichia coli (NSF E. coli). The Bacterial isolates were identifed by using morphological diagnostic methods, Samples were cultured on liquid enrichment medium, incubated at 37C? for 24 hrs, and then cultured on Cefixime Tellurite -Sorbitol MacConkey Agar (CT- SMAC). 32 non-sorbitol fermenting bacterial isolates were obtained of which 11 were identified as Escherichia coli by using traditional biochemical tests and API20E diagnostic system without differentiation between
... Show More