Preferred Language
Articles
/
jpgiafs-538
The use of technology review and evaluate programs PERT to improve the cost method on the basis of activity: بحث تطبيقي في الشركة العامة للصناعات النسيجية /واسط
...Show More Authors

Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products  The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of deviations Department knitting socks and put several alternatives to the management for the purpose of decision-making. And for the purpose of access to the goal of research The research was based on a fundamental premise (that the use of technical review and evaluate programs lead to understanding and improving the implementation of the cost method on the basis of activity). It adopted a researcher at the theoretical side on the method of inductive sources, references and research available in the international information network (Internet), but the practical side has been relying on the descriptive approach through the financial statements, interviews, and meetings with officials in the company sample, as well as follow-up field.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change (ijicc)
The relationship between conceptual knowledge and procedural knowledge among students of the mathematics department at the faculty of education for pure sciences/IBn Al-Haitham, university of Baghdad
...Show More Authors

Scopus (25)
Scopus
Publication Date
Fri Aug 08 2025
Journal Name
Enterpreneurship Journal For Finance And Business
The role of psychological ownerships' dimensions in deterring the effects of toxic leadership: Analytical research in some companies at the Ministry of Industry and Minerals in Iraq
...Show More Authors

View Publication
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A reflection of increased financing Equity on returns commons stocks
...Show More Authors

The research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.

This research has included some of the theoretical concepts to each of the Equity

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Sep 03 2010
Journal Name
Journal Of The College Of Education For Women
Analysis of Grammatical Forms and Semantic Functions of Hedging in Political Discourse: American Presidential Debate: تحلیل نماذج نحویة ذات وظائف دلالیة مستعملة في الخطاب السیاسي بوصفھ اسلوباً تحوطیاً: المناظرة الرئاسیة الاولى في الانتخابات الامریكیة
...Show More Authors

Hedging is a linguistic avoidance of full commitment or precision. It is the use of a vague language. The main objectives of this study are to

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Emotional Trends, and Emotional Exhaustion in organizations: (Developing foundations the philosophy and thinking in organizational behavior)
...Show More Authors

Emotional exhaustion considered one of the critical factors in the formation and composition of organizational behavior of individuals within organizations, as well as social behavior and psychological, and emotional exhaustion is one of the three components of burnout, as well as depersonalization (cynicism) and low achievement, the emergence of research relevant to this concept began at the beginning of the seventies of the twentieth century, then started to become clear features in the eighties it. This research aims to build intellectual framework for draining emotional exhaustion through highlight on most important philosophical contents, as well as review and analysis of some models associated with this concept, and then a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Antibacterial Effect of Mastic Gum on Aerobic Oral Bacteria
...Show More Authors

Objective: To evaluate the antibacterial effect of mastic gum against the most common aerobic oral bacteria and
emphasized on oral streptococci.
Methodology: In this study 10 persons (males and females of 18-60 years old) were randomly assigned to chew
mastic gum (1.5 gm for 45 minutes). Mouth washes were collected before and after gum chewing .The two mouth
washes were diluted (10-1 – 10-6) and cultivated aerobically for 24 hours at 37C0 on BHI agar for total bacterial
count and on MSF agar for counting the oral streptococci.
Results: The results showed that the total bacterial count for staphylococci, Neisseria and oral streptococci on BHI
agar and MSF agar for oral streptococci after mastic chewing were highly r

... Show More
View Publication Preview PDF
Publication Date
Sat May 31 2025
Journal Name
Iraqi Journal For Computers And Informatics
Discussion on techniques of data cleaning, user identification, and session identification phases of web usage mining from 2000 to 2022
...Show More Authors

The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On The Nearby-Tip Strain Investigation and Failure-Propability Evaluation for Impacted Thin Plates Using the 2-Random-Variables Multi-Canonical-Based Joint Propability Distributions
...Show More Authors

The study of the validity and probability of failure in solids and structures is highly considered as one of the most incredibly-highlighted study fields in many science and engineering applications, the design analysts must therefore seek to investigate the points where the failing strains may be occurred, the probabilities of which these strains can cause the existing cracks to propagate through the fractured medium considered, and thereafter the solutions by which the analysts can adopt the approachable techniques to reduce/arrest these propagating cracks.In the present study a theoretical investigation upon simply-supported thin plates having surface cracks within their structure is to be accomplished, and the applied impact load to the

... Show More
View Publication Preview PDF
Crossref