In a world of fierce competition companies of different activities strive to strengthen their competitiveness in order to be able to deliver greater value to their customers and gain a distinct sites in competition with other companies in the market at the local and international levels. Every company seeks to focus on one or more of the competitive capabilities in order to turn it into an obvious advantage or a number of competitive advantages to contribute in improving the performance and superiority over its competitors. Therefore, the management of companies no longer need only useful information for the internal aspects of the environment, but also need to include the external environment that includes various and constantly changing factors from competitors and customers alike. Accordingly, the research aims to verify the role of accounting information system in enhancing the competitiveness of public industrial companies, using data collected by questionnaires distributed to a sample of auditors at the public industrial sector's auditing committees of the of Federal Supreme Audit Board. The research has reached a number of results, the most important is that the financial accounting information system provides useful information contributing to the rationalization of economic decision-making process for parties outside the company and the management accounting information system provides useful information contributing to the rationalization of the decisions of the Parties within the company. Also, that the accounting information system does not provide useful information about both the external and internal factors that contribute to enhancing the competitiveness of the company.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreLos nombres propios nombran a un ser o a un objeto, distinguiéndolo de los demás seres de su misma clase, se escriben siempre con letra mayúscula a principio de palabra. Los lingüistas hacen mayor hincapié en las divergencias de referencia, entre nombres propios y nombres comunes. Así, suele decirse que el sustantivo propio no tiene como referente ningún concepto. El asunto de la traducción de los nombres propios parecería una cuestión de gusto personal del traductor pero vemos también que en algunas épocas es más frecuente traducirlos, y en otras, por el contrario, se prefiere dejar esos nombres en su forma original, tal vez con algunas adaptaciones ortográficas. Parecería entonces cuestión de modas. Pero, eviden
... Show MoreThe aim of this study is to evaluate the anti fungal activity of a combination of essential oils against water molds. HPLC analysis was done to evaluate the quantity and quality of the active compounds in this combination which extracted from three herbs( Peppermint Menthapiperita ,Thyme Thymusvulgaris, Common sage Salvia officinalis L.) and the active compounds are Camphor,Menthol,,Thujone and Thymol with different concentrations. In this study (MIC) , (MFC) were measured and (LD50) determined after 48,96 h from fingerlings treatment of common carp in aquariums .The results of (MIC) were 0.025µl/ml for Aphanomyces sp. and 0.015µl/ml for both Achlya sp. and Fusariumsolani which showed significant differences(p<0.05) from Malachite gre
... Show MoreSystemic lupus erythematosus (SLE) is the prototypic multisystem autoimmune disorder with a broad spectrum of clinical presentations encompassing almost all organs and tissues. Aimes of study determination of integrin- linked kinase 1(ILK-1) and anti-smith antibody(ASAB) levels in serum of Iraqi patients with systemic lupus erythematosus, in addition, that ILK-1 may be as a diagnostic marker of SLE disease, and study the effect of systemic lupus erythematosus on renal function in these patients. This study included 100 females’ patients with systemic lupus erythematosus attending to the Rheumatology Unit in Baghdad Teaching Hospital, Medical City, (Baghdad), in addition to 30 healthy females as controller group were chosen without any chr
... Show MoreBoth type 1 diabetes and type 2 diabetes have a genetic component, with over 60 chromosomal regions related to type 1 diabetes and over 200 connected with type 2 diabetes at significant genome-wide levels. Numerous single nucleotide polymorphisms in the RETN gene and genetic variables can account for up to 70% of the variations in circulating resistin levels. The RETN polymorphism has been linked in numerous studies to obesity, insulin sensitivity, type 2 diabetes, and cerebrovascular illness. Our objective is to compare this RETN gene 3ʹ-untranslated region polymorphism in type 1 diabetes and type 2 diabetes Iraqi patients. We choose 51 type 1 diabetes and 52 type 2 diabetes patients against 50 healthy subjects (control group) to investig
... Show More