Witnessing the global arena many changes in the political, economic, social, scientific and technological have left their mark on the world as a whole, these changes require necessarily Advancement of the profession of auditing, and improve their performance, especially after the mixer skepticism the health of approach and the method followed by a check in the major audit firms global view as for the external audit of an active role in providing services to members of the community in various sectors, were to be provide these services to the highest level of quality.To ensure the quality of the audit process to be a proper planning is based on a scientific basis to be the substrate a strong underlying different audit works, and if planning important for the accomplish the audit process with high quality, the choice of technology that will be followed in planning no less important, and popped the problem not to resort to scientific methods in planning the audit process, implementation and limited to estimates personal auditors when determining audit procedures and when estimating the time required to perform the audit, and in the light of the study theory and practice that has been in the research has been to reach a set of conclusions and recommendations. Of the main conclusions, The style of PERT- CPM contributed to the reduction of the time the audit process through the coordination of activities in a scientific thoughtful, and achieved a surplus in the time it was possible to exploitation by the members of the audit team to carry out the other at the same work site or at other work sites, and then mitigate time pressures suffered by the members of the audit team and maintain the required level of professional care and the quality of work performed.The study provided a number of recommendations, including, Adoption of the proposed mechanism, which means planning the audit process and implemented according to the methods of time management, for providing clarify and simplify the application of the style of PERT- CPM in the audit process, and achieve these two methods of providing a scientific basis thoughtful planning, scheduling and follow-up and then raise the quality of the audit process.
In this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.
Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreAcute lymphoblastic leukemia (ALL) is one of the commonest hematological malignancies affecting children and adults. Recent evidence suggests an involvement of Epstein-Barr virus (EBV) in ALL pathogenicity. Epigenetic aberration, especially altered DNA methylation marks, is a key event of cancer development. The present study aims to investigate how the ALL epimethylome reacts to viral infection through the assessment of the total 5-methylcytosine (5mC) levels in ALL patients, according to EBV infection. The 5mC global DNA methylation levels in 50 diagnosed ALL patients (age mean 26.23 yrs; age range 10-60 yrs) and 25 age-matched healthy controls were assessed using MethylFlash™ Methylated DNA Quantification Kit. Acute pri
... Show MoreIn this study tungsten oxide and graphene oxide (GO-WO2.89) were successfully combined using the ultra-sonication method and embedded with polyphenylsulfone (PPSU) to prepare novel low-fouling membranes for ultrafiltration applications. The properties of the modified membranes and performance were investigated using Fourier-transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), contact angle (CA), water permeation flux, and bovine serum albumin (BSA) rejection. It was found that the modified PPSU membrane fabricated from 0.1 wt.% of GO-WO2.89 possessed the best characteristics, with a 40.82° contact angle and 92.94% porosity. The permeation flux of the best membrane was the highest. The pure water permeation f
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreMicro wind turbines are generally used in remote locations, and it is difficult and expensive to repair faults which forced the need for condition monitoring and fault diagnosis which has not been used extensively for small turbines. The possibility of utilizing Fast Fourier Transform (FFT) for diagnosis the faults of broken rotor bar in squirrel cage induction motor of a micro wind turbine was investigated. Monitoring and analysis the current spectrum can be effective for diagnosis the early stage of faults and avoid complete catastrophic failure in the motor by powerful virtual instruments and LabVIEW software as an integral part of this instrumentation. Combination advanced signal processing technique with computerized signal processi
... Show MoreChickenpox is a viral disease caused by a virus called varicella zoster (VZ). Chickenpox cases were counted in Al-Dora city (southern Baghdad). Data of disease was obtained from the records of Bilat Al-Shuhadaa health center at the period from January to July 2012. Diagnosis of cases was achieved by the physicians of the health center. Studied risk factors were including the gender, address, school and age. Total of cases recorded was 73cases (66.9 per 100,000) populations for seven months. Males reported cases were 48 (65.7%) while female’s cases were 25(34.3%). The highest reported cases were signed in Al-Mhdia-1 sector (24.6%).Also highest reported cases were signed in Al-Mhdia primary school (17.8%). Most VZ cases were reported in
... Show More