Preferred Language
Articles
/
jpgiafs-172
The application of the dimensions of TQM and its impact in enhancing the satisfaction of the taxpayers: Applied Study in the General Commission for Taxes
...Show More Authors

The concept of TQM is based on one of the concepts that combine administrative and innovative methods. The aim of the research is to demonstrate the dimensions of TQM in enhancing the satisfaction of the taxpayers through a survey of a sample of officials in the General Authority for Taxation and 50 officials. In the collection of data and information, and the results were analyzed using the SPSS program to find the most important compounds and factors in he method of analysis.

The research problem was represented by the non-application of the General Authority for Taxation to the entrances and modern practices in the administrative work. The results of some of the complications that accompany the tax accounting process, which affect the nature of the relationship between the taxpayer and tax administration as well as the taxpayer's feeling of dissatisfaction, With a significant effect of factors and variables of total quality management in the satisfaction of taxpayers, and the researcher reached a set of conclusions was the most important: To meet the needs and desires of the taxpayers to implement the TQM and is available to the General Authority for Taxation Cannery The need for full Application of Total Quality Management.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Composites Science
Sawdust-Based Concrete Composite-Filled Steel Tube Beams: An Experimental and Analytical Investigation
...Show More Authors

Incorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Hybrid Color Image Compression Using Signals Decomposition with Lossy and Lossless Coding Schemes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (211)
Crossref (208)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Tue Aug 16 2022
Journal Name
جامعة بغداد/ كلية التربية للعلوم الصرفة - ابن الهيثم
أثر استراتيجية التدريس البصري باستخدام الانـفوجرافيك في التحصيل والتفكير البصري لدى طلاب المرحلة المتوسطة فـي مادة الرياضيات
...Show More Authors

أثر استراتيجية التدريس البصري باستخدام الانـفوجرافيك في التحصيل والتفكير البصري لدى طلاب المرحلة المتوسطة فـي مادة الرياضيات

Publication Date
Mon Sep 25 2023
Journal Name
Arab Science Heritage Journal
المدراس الثانوية في الاعظمية ( ثانوية كلية بغداد- ثانوية الأعظمية للبنين – ثانوية الأعظمية للبنات - ثانوية الحريري للبنات) أنموذجاً
...Show More Authors

Education received the attention of the monarchy in Iraq, especially after the developments that the country witnessed after Iraq gained independence and joined the League of Nations in 1932 AD in all political, economic and cultural aspects.  In this regard, due to its distinguished geographical location, where the atmosphere, the natural environment and the religious and political standing were available, which made it a center of attraction for most Iraqi families and political figures. 

View Publication Preview PDF
Publication Date
Sun Jul 03 2022
Journal Name
مجلة البحوث التربوية والنفسية
تقويم الأنشطة والأسئلة التقويمية المتضمنة في محتوى كتاب الحاسوب للصف الخامس الإعدادي وفق التفكير الإبداعي ومقترحات تطويرها
...Show More Authors

يهدف هذا البحث الى تقويم الأنشطة والأسئلة التقويمية المتضمنة في محتوى كتاب الحاسوب للصف الخامس الإعدادي وفق التفكير الإبداعي ومقترحات تطويرها، وذلك بالإجابة عن السؤال الآتي: ما نسبة توافر مهارات التفكير الإبداعي في الأنشطة والأسئلة التقويمية المتضمنة في محتوى كتاب الحاسوب المقرر لطلبة الصف الخامس الإعدادي (الاحيائي والتطبيقي، والادبي) من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي (2

... Show More
Preview PDF
Crossref
Publication Date
Sun Nov 25 2018
Journal Name
Journal Of Planner And Development
أثر تباين الإمكانات السياحية في قوة الجذب المكاني للإقليم الحالة الدراسية: محافظة السليمانية ضمن إقليم كوردستان العراق
...Show More Authors

View Publication Preview PDF