The problem of research was to identify after the use of cost technology based on specifications in the validity of determining and measuring the costs of the implementation of contracting, by applying to al-Mansour General Construction Contracting Company as an appropriate alternative to the traditional costing system currently adopted, which is characterized by many shortcomings and weaknesses Which has been reflected in the validity and integrity of the calculations. To solve this problem, the research was based on the premise that: (The application of cost technology based on specifications will result in calculating the cost of the product according to the specification required by the customer, to meet his wishes properly and without any waste and loss of costs). The research a set of conclusions and recommendations, perhaps the most important of which is that the application of (ABCII )technology in the implementation of contracting contracts helped to reduce the cost of the product (apartment), and this reduction will provide a vision of the company for the importance of the specification in determining the cost of products desired by the customer, as well as determining the citizen Excessive cost to be processed leading to staying in the market and achieving a competitive advantage, and based on the results of the research the researcher recommends the need to adopt cost technology based on specifications, because it provides correct and complete information to help to make strategic decisions that enable the company to Sovereignty in the competition market for contracting.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBackground: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThis study aims to find out the effectiveness of a cognitive-behavioral counseling program in enhancing self-management in reducing the academic procrastination of tenth-grade male students. The sample consisted of (26) male students divided into an experimental group of (13) students and a control group of (13) students. Two scales of self-management and academic procrastination were used, prepared by the researcher. The counseling program was prepared by the researcher. The results showed the program's effectiveness in enhancing self-management and reducing academic procrastination in the posttest, as it showed the continuation of this enhancement in self-management and the increase in the reduction of procrastination in the follow-up
... Show MoreOld New York was Wharton's term to describe this wealthy and elite class at the top of
the developing city's social hierarchy, a society which was utterly intent on maintaining its
own rigid stability. Even though, the roles of women in American society changed drastically
from 1820’s to 1860’s due to the civil war and such a progression was due in part to the
revolutionary thoughts. Women started taking their right to speak up openly and frankly and
become more like men. The role of many women had changed from being homemaker to
being able to provide for the family by either getting a job or start to be allowed to have a
voice. They had important roles not only in helping the family, but in sharing to rebuild th
China occupies an area of 906 million square km. and lies east Asia. Its population approximately 1,388 people, according to census 2010. China was a global great power for centuries , then shrank its jurisdiction and occupied by European countries and Japan in the 19th century. It regained its strength and independence under the leadership and rule of the Chinese Communist Party since 1949. In the 21st century , the Chinese positions has risen universally due to its achievements in the economic and trade affairs . Nowadays, China became a largest exporting state in the world and a second economic power after USA.