Preferred Language
Articles
/
jpgiafs-172
The application of the dimensions of TQM and its impact in enhancing the satisfaction of the taxpayers: Applied Study in the General Commission for Taxes
...Show More Authors

The concept of TQM is based on one of the concepts that combine administrative and innovative methods. The aim of the research is to demonstrate the dimensions of TQM in enhancing the satisfaction of the taxpayers through a survey of a sample of officials in the General Authority for Taxation and 50 officials. In the collection of data and information, and the results were analyzed using the SPSS program to find the most important compounds and factors in he method of analysis.

The research problem was represented by the non-application of the General Authority for Taxation to the entrances and modern practices in the administrative work. The results of some of the complications that accompany the tax accounting process, which affect the nature of the relationship between the taxpayer and tax administration as well as the taxpayer's feeling of dissatisfaction, With a significant effect of factors and variables of total quality management in the satisfaction of taxpayers, and the researcher reached a set of conclusions was the most important: To meet the needs and desires of the taxpayers to implement the TQM and is available to the General Authority for Taxation Cannery The need for full Application of Total Quality Management.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Engineering, Technology & Applied Science Research
Producing Green Concrete with Plastic Waste and Nano Silica Sand
...Show More Authors

Abstract-Industrial and urban development has resulted in the spread of plastic waste and the increase in the emissions of carbon dioxide resulting from the cement manufacturing process. The current research aims to produce green (environmentally friendly) concrete by using plastic waste as coarse aggregates in different proportions (10% and 20%) and nano silica sand powder as an alternative to cement in different proportions (5% and 10% by weight). The results showed that compressive strength decreased by 12.10% and 19.23% for 10% and 20% plastic waste replacement and increased by 12.89% and 20.39% for 5% and 10% silica sand replacement respectively at 28 days. Flexural strength decreased by 12.95% and 19.64% for 10% and 20% plastic waste

... Show More
Publication Date
Thu Apr 13 2023
Journal Name
Corrosion And Protection
NEW THERMOTROPIC SYMMETRICAL MESOGENS CONTAINING HETERO RINGS: SYNTHESIS AND CHARACTERIZATION
...Show More Authors

A variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u

... Show More
Preview PDF
Publication Date
Thu Jul 25 2019
Journal Name
Advances In Intelligent Systems And Computing
Solving Game Theory Problems Using Linear Programming and Genetic Algorithms
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sun Nov 12 2023
Journal Name
Migration Letters
Piezoelectric Energy Harvesting from Vortex-Induced Vibrations: Design and Correlations
...Show More Authors

This study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 16 2022
Journal Name
Methods In Molecular Biology
Fluorescent Proteins: Crystallization, Structural Determination, and Nonnatural Amino Acid Incorporation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
Lipid Profile Parameters and Adipokines among Adolescents Infected with Toxoplasmosis
...Show More Authors

The lipid profile and adipokines of an adolescent may be affected by some parasite infections. Recently, it has been discovered that these parasites are connected to body mass index (BMI), lipids and adipokines. The current study, therefore, aimed to specify how Toxoplasma gondii (T. gondii) affect BMI, lipid profile and adipokines. This study was conducted in Al Madain hospital, Baghdad from October to December 2022. An ELISA test was performed to examine the anti-T. gondii IgG and IgM for a group of adolescents attending the hospital. Based on this examination ninety adolescents were chosen to be involved in the study. They were separated in to two groups: individuals who tested positive for the parasite (n=45) and those who teste

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
E-small prime sub-modules and e-small prime modules
...Show More Authors

Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref