The aim of the research is to demonstrate the extent of the impact of resource consumption accounting technicality as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information it provides and scientific foundations in the allocation of indirect costs, and the identification and measurement of idle energy and its costs in a way that contributes to the rationalization of pricing decisions in economic units. In light of the intense competition and the multiplicity of alternatives, and to achieve this goal, a random sample was chosen.
MT Abed, ALSG Irhayyim, TH Rija, International Journal of Psychosocial Rehabilitation, 2020 - Cited by 1
Many nations are seeing an increase in water pollution from dairy and cheese production due to the high organic and fat content in their waste products and the high temperature of their waste products, which elevates the water temperature and causes loss to ecosystem components. Reusing industrial wastewater that has been treated to guarantee no harm has been done to the environment is being hampered by a lack of water. This study compares the presence and absence of mixing in the anaerobic biological treatment of liquid waste for the cheese industry. To decrease heat exchange with the external environment, cube-shaped anaerobic reactors with dimensions of (30 x 30 x 30) cm and thick glass (10 mm) were utilized in this investigation
... Show MoreThe present paper discusses morphological and syntactic structures of time in Russian language. The morphological and syntactic structures are considered part component of time category in Russian language.
The morphological categories of time are formed through a various types of expressions .Tenses generally express time relative to the moment of speaking. In some contexts, however, their meaning may be relativized to a point in the past ,present or future which is established in the discourse .Some languages have different verb forms or constructions and that are opposed in meaning not in syntactic category. Hence, the present study traces and compares the syntacti
... Show MoreThe Fountain of poetry Canot be suddenly flow or flood from emptiness. but it is streams and motives drive it to move . Forward tat Calmness and latent in depth of poet ,and try to Chang it in to high wives , go in to details inside the seas of poetry ,to sail threw it on the ships of poetry in creative styel to reach to the point from imaginary meaning , so every poet has direction to competein poetry poetsin Lament of Imam Hussain, There versification of poetry didn’t come from emptiness , but there was clashes motive them threw Calling the personality of Imam Hussain to learn lesson in avery beautiful and greative styel ,to be the expression poem from many sides in the personality of Imam Hussain from that events and facts that happ
... Show MoreMetaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More