Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of deviations Department knitting socks and put several alternatives to the management for the purpose of decision-making. And for the purpose of access to the goal of research The research was based on a fundamental premise (that the use of technical review and evaluate programs lead to understanding and improving the implementation of the cost method on the basis of activity). It adopted a researcher at the theoretical side on the method of inductive sources, references and research available in the international information network (Internet), but the practical side has been relying on the descriptive approach through the financial statements, interviews, and meetings with officials in the company sample, as well as follow-up field.
The research aims to determine the principles of total quality management (commitment of senior management, product planning, customer satisfaction, process improvement) and its role in promoting employee loyalty through a sample survey of the opinions of managers in public redemption Company. Which amounted to (45) individuals adoption of the questionnaire as a tool head in collecting data and information and their responses were analyzed using several statistical methods, which included (arithmetic mean, standard deviation, correlation coefficient, and the coefficient of simple regression) depending on the program (spss). The research found a group of the most important conclusions from the presence
... Show MoreThe movement and broadening of foreign and European words into Persian is a topic within historical linguistics. Such changes are semantic, phonological
Since many of these European loanwords into Persian took a remarkable space within Persian dictionaries, and became an indispensible part of the language, a study of the original languages of these loanwords may identify the enormous effect of those languages upon Persian, being a receptor language, and may refer to the liveliness.
Among the important factors which helped the movement of various loanwords into Persian are:
- Geographical: this is seen via contact between Persian people and those neighboring people, specifically those speaking Ara
In this article we study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.
which showed the results to a preference MLE on MME based on the standard of comparison the average square e
... Show MorePraise be to Allah and peace and blessings be upon our Prophet Muhammad and on his family and companions
Yet,
The prophets (peace be upon them) urged all thevalues and one of these is the value of work which is of a great importance, that all nations have gathered against us as the eaters gather at a bowl. One of the reasons of our weakness and the strength of our enemy is that we have neglected the value of work. And rather a large number of ignorant and uneducatedpeople started to believe that the means of living, triumph, gaining power, and establishing a civilization are given by Allah with neithergainingnoreffort from us. While we find in the past that Allah the Almighty narrated to us the story of Mary (Peace be upon her) and
Abstract
Most universities in the world are largely committed to creating credible and transparent admission standards that provide justice in admission and have the ability to predict students' performance in their chosen programs. Hence, this study aimed to reveal the predictive ability of the acceptance criteria for the level of performance of master's students in the College of Education at Sultan Qaboos University. Quantitative data were collected from (115) students' admission documents for those accepted in the postgraduate programs for the academic year 2019-2020, and GPA data was collected from students’ transcripts for the fall semester of 2019. Qualitative data were also collected from the interviews
... Show MoreA New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreABSTRACT
The research aims to study the effect of the commodity dumping phenomenon that Iraq suffered after 2003 on the consumption pattern of individuals, towards the acquisition of non-essential goods (luxury). To achieve our goal we relied on the questionnaire as a main tool for obtaining information related to the research, and it was distributed on a random sample of consumers in the city of Baghdad with 250 questionnaires. The answers of the research sample were analyzed using the statistical program (SPSS). The percentage weights and the factorial analysis method were used also to arrange the variables that affected on changing consumption patterns. The research reached a set of conclusions:
... Show More