Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of deviations Department knitting socks and put several alternatives to the management for the purpose of decision-making. And for the purpose of access to the goal of research The research was based on a fundamental premise (that the use of technical review and evaluate programs lead to understanding and improving the implementation of the cost method on the basis of activity). It adopted a researcher at the theoretical side on the method of inductive sources, references and research available in the international information network (Internet), but the practical side has been relying on the descriptive approach through the financial statements, interviews, and meetings with officials in the company sample, as well as follow-up field.
This study aimed to examine the effects of electronic training to improve the skills of designing electronic courses for teachers of Arabic language in the colleges of education in Iraq. The descriptive approach is applied and the sample included 145 teachers of Arabic who were selected randomly from the colleges of education in Iraq. Moreover, the results reflected that e-training is effective in improving the skills related to designing online educational courses for teachers of Arabic in the colleges of education in Iraq. Besides, there was no difference between the mean of the respondents' responses to the total score of the tool on the role of electronic training to develop the skills related to electronic courses designing for teacher
... Show MoreAbstract
We can see the phenomena of small and medium-sized enterprises, by important and a new subject contemporary, thro related between important concept that develop and add. This research focused on the important concept of small and medium-sized enterprises, in public and privet sectors. small and medium-sized enterprises discrimination by large filer ratio in the especially at the first years when they started because of the limited managerial skills, financial recourses and marketing problems. On it they will creative new procedures. this research treatment the core issues about wakens local and international enterprises, so threat. the goals of this research are extended malty dimension concept o
... Show MoreGlobal Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fi
... Show MoreThe mechanical function of the heart is governed by the contractile properties of the cells, the mechanical stiffness of the muscle and connective tissue, and pressure and volume loading conditions on the organ. Although ventricular pressures and volumes are available for assessing the global pumping performance of the heart, the distribution of stress and strain that characterize regional ventricular function and change in cell biology must be known. The mechanics of the equatorial region of the left, ventricle was modeled by a thick-walled cylinder. The tangential (circumferential) stress, radial stress and longitudinal stress in the wall of the heart have been calculated. There are also significant torsional shear in the wall during b
... Show MoreThis study aimed to clarify the provisions of taking the mother for breastfeeding in Islamic jurisprudence, a comparative study between doctrines of jurisprudence. The ruling on forcing the mother to breastfeed, and the ruling on taking the mother for breastfeeding while she is in the infallibility of her husband, as well as in several reactionary divorces, and the ruling on breastfeeding in several divorced divorces. On breastfeeding in infallibility Face, as well as a several divorce reactionary, and worth the fare which is in several final divorces, and after the end of the marital relationship, has been proposed a number of recommendations, including it, is recommended to teach the provisions of the mother taking the taxi on breastfe
... Show MoreThere is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show More