The contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting technique for cost management, working on the optimal exploitation of available resources and employment of idle energy to contribute to reducing the cost of products and enhancing competitiveness between units, as well as explaining its concepts, components, features and determinants of their application. Between the unit's resources and outputs, in order to support senior management financially and materially. b Resisting change, which is attributed to lack of knowledge of application rules and policies on the one hand, and fear of failure to adopt cost management techniques. The researchers recommend the adoption of the proposed vision of technology in the Iraqi units to know the homogeneous resource pools, which will clarify the interconnected relationships between them and indicate the extent to which each resource directly benefits from the other, with the aim of knowing the path of the flow of energy costs, in order to reach the cost measurement as much as the resources used.
Background: The aim of this study was to comparatively evaluate the push out bond strength (PBS) of root canal fillings using four different obturation techniques (single cone (SC), cold lateral compaction (CLC), continuous wave (CW), and carrier based gutta percha (CBG)). Materials and Methods: Forty mandibular premolar decoronated and instrumented with rotary ProTaper to F3 then teeth were divided randomly into 4 groups of 10 teeth for each as follow: group (I) single- cone obturation with matched-taper gutta-percha, group (II) cold lateral compaction technique, group (III) continuous wave of obturation technique, and group( IV) carrier based gutta-percha technique. Zinc oxide eugenol (ZOE) sealer was used as a root canal sealer for the
... Show Moreالخلاصة
يجمع المختصون أن ليس من نقد إلا وكان مُرحِّلا لنظرية لسانية إلى فضائه، فكان أثر اللسانيات السوسيرية، ومن ثم اللسانيات التوليدية التحويلية معروفا، ولم يكن هذا الأثر محدودا باللسانيين أو نقاد الأدب فحسب، بل امتد إلى الشعراء والجماليين أيضا. وفي هذا البحث سنتوقف عند أثر اللسانيات الوظيفية، وهو ما لم يتوقف عنده إلا قلة من المختصين. ولن نقف عند نقد الوظيفيين للشعر، بل سنقف عند نقدهم للرواية، بقراءة
... Show MoreA field experiment was conducted at Abu-Ghrib during 2013- 2014 season to study the effect of harrowing systems on the decomposition and fermentation on organic matter(OM) when added and mixed with the soil under special technology, as well as its effect on the growth parameters and productivity of (Zea mays L. 5018). The experiment was laid out using factorial randomized complete block design (RCBD) in split-split design with three replications in SCL bare soil with a percent of moisture ranged from 16 – 18 %. The main plots were designated to the two systems of harrowing (Rotary Harrowand Disc Harrow ). The sub main plots were specified for two organic matters ( Sheep manure ,cow manure ) . Data were statistically analyzed, and
... Show MoreBackground: Restoration of root canal treated teeth with a permanent restoration affect in the success of endodontically treated teeth. This in vitro study was performed to evaluate and compare the fracture strength of endodontically treated teeth restored by using custom made zirconium posts and cores, prefabricated carbon fiber, glass fiber and zirconium ceramic posts. Materials and method: Forty intact human mandibular second premolars were collected for this study and were divided into five groups. Each group contains 8 specimens: Group1: Teeth restored with Carbon Fiber Posts; Group2: Teeth restored with Glass Fiber Posts; Group3: Teeth restored with Zirconium Ceramic prefabricated Posts; Group4: Teeth restored with Zirconium Posts
... Show MoreClean water supply is one of the major factors contributing significantly to society’s socio-economic transformation by improving living standards, health, and increasing productivity. It is imperative to plan and construct appropriate water supply systems in modern society, which supply various segments of society with safe drinking water according to their requirements to ensure adequate and quality water supply. In the current study, here was an attempt to develop a model for geographic information systems to manage the assets of the water distribution networks in the Karrada region and to evaluate the network geometrically, and from the results of the engineering analysis of the
The definition of "prostitute" and prostitution is a difficult one and a
question over which the legislators of many lands and nations differed. A
notable feature of prostitution is its epidemic increase at times of war,
revolution and armed commotion, on account of economic, social and
psychological factors generated by such conditions of mortal conflicts. Wars
invariably deprive young wives and lovers of their men folk, resulting in
financial , sexual and emotional frustrations . At no time is the natural
balance between the sexes more seriously disturbed than during wars, when
thousands of men are thrown into one sector of the country and hundreds of
towns and villages are left to women and children only. Lo
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, and upon his family and companions
And whoever follows his guidance until the Day of Judgment. As for what follows: Islamic law commands Muslims to unite, reject disagreement, and not dispute, and to spread the spirit of tolerance and love among them. God Almighty said: “And hold fast to the rope of God all of you and do not become divided, and remember the favor of God upon you when you are enemies and He has joined your hearts.” So, by His grace, you became brothers (1), and He said: (And You will be like those who became divided and disagreed after the clear proofs had come to them. It is they - for them is a great punishment.) (2
... Show MoreIn wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show More