Preferred Language
Articles
/
jpgiafs-1085
Resource consumption accounting technique between traditional cost systems and contemporary cost management techniques in measuring the cost of products - A conceptual vision
...Show More Authors

The contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting technique for cost management, working on the optimal exploitation of available resources and employment of idle energy to contribute to reducing the cost of products and enhancing competitiveness between units, as well as explaining its concepts, components, features and determinants of their application. Between the unit's resources and outputs, in order to support senior management financially and materially. b Resisting change, which is attributed to lack of knowledge of application rules and policies on the one hand, and fear of failure to adopt cost management techniques. The researchers recommend the adoption of the proposed vision of technology in the Iraqi units to know the homogeneous resource pools, which will clarify the interconnected relationships between them and indicate the extent to which each resource directly benefits from the other, with the aim of knowing the path of the flow of energy costs, in order to reach the cost measurement as much as the resources used.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Modrating Role of Dynamic Knowledge capabilies in Addressing Organizational Failures to Achieve Business Competitiveness: Applied Research in Dairy Industries
...Show More Authors

Purpose/ to build clear perceptions about the level of the effects of organizational failures on the competitiveness of dairy factories and the role of dynamic knowledge capabilities in minimizing these impacts

Mythology/ Design approach Use deduction approach, the research was conducted in four dairy factories in Baghdad (Abu Ghraib, Agriculture, Halal and Ayon Al-Rafidain). It was applied to a sample of (155) individuals representing a sample of the research community from factory owners, managers, Engineers, technicians and experienced workers in the dairy industry. The questionnaire was used as a main tool for collecting data, information and statistical tools in the extraction, testing and analysis o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
Issues of Iraqi Photojournalists Working in Local and Foreign Institutions in Iraq: Iraqi Photojournalists Association - Case Study 2012
...Show More Authors

The issues of journalists and media employees in general and photojournalists in particular have become important issues, especially as those issues are closely linked to the success or failure of the media process.

This research deals with (the issues of Iraqi photojournalists working in local and foreign institutions in Iraq - a case study in 2012), because of the ambiguity in identifying those issues, which focused on the issues of this research.

This was done through the research community of members of the Association of Iraqi photojournalists in Baghdad exclusively of (64) photographers and television photographers to identify the problems encountered in their work

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Personal tax exemptions "a comparative study with some Arab and European system legislations
...Show More Authors

This research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.      

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Pakistan Heart Journal
Workplace Violence and Nursing Job Performance at Pediatric Emergency Departments: A Comparative Study
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref