Preferred Language
Articles
/
jpgiafs-899
The use of electronic applications in the preparation of operational budgets: An applied research in one of the private sector companies for dairy industry / Baghdad
...Show More Authors

A revolution called information revolution has recently invaded the world. It is Currently considered one of the most important properties of development to the countries of the world The criteria provided by computers such as accuracy, speed, time saving Storage and restore have led them to be widely used in economy, industry, agriculture, communications, etc., as well as being the major finder of reengineering the operations of innovation. The use of computers in the preparation of budgets will lead to achieve accuracy. Since, the operation draws upon the statistic and quantity estimations about budget items, the computerized balance sheet may save time and effort of preparing mathematical equations annually. According to the problem of study, the researchers concluded that it is necessary to use computers in reengineering the budget of balance sheet to save time and effort of preparation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Impact of Using Subsurface Water Retention Technology on Improving Water Use Efficiency of Furrow Irrigation System
...Show More Authors
Abstract<p>Evaluation was carried out on the existing furrow irrigation system located in an open agricultural field within Hor Rajabh Township, south of Baghdad, Iraq (latitude: 33°09’ N, longitude: 44°24’ E). Two plots were chosen for comparison: treatment plot T1, which used subsurface water retention technology (SWRT) with a furrow irrigation system. While the treatment plot T2 was done by using a furrow irrigation procedure without SWRT. A comparison between the two treatment plots was carried out to study the efficiency of the applied water on crop yield. In terms of agricultural productivity and water use efficiency, plot T1 outperformed plot T2, according to the study’s final fin</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Use of DAF markers (DNA Amplification Fingerprint) to Assess Genetic Diversity of Rice (Oryza satival L.)
...Show More Authors

This study was carried out to assess genetic diversity of ten cultivars of Rice (Oryza sativa L.). One of DNA markers based on Polymerase Chain Reaction (PCR) was used namely DAF markers (DNA Amplification Fingerprint). Six primers were tested, the results showed, that no amplification products using the primers OPD.14 and OPM.5. Two primers (OPX.8 and OPT.2) produced monomorphic band across all cultivars, while only two primers generated polymorphic bands. The number of total bands produced from one of them (OPN.7) were sixteen. Also this primer produced ten polymorphic profiles (DAF patterns) which were unique to the ten cultivars that could be distinguished. The number of total bands generated by primer OPX.1 were thirteen and this prim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Mechanism of Using of Income Tax in Achievable of Economic Targets in Iraq
...Show More Authors

The present study is concerned with the role of income tax in implementing economic goals in Iraq and treating the problems and pitfalls in the Iraq economy.

The study also aims at investigating the role of income tax in attracting promising favorite effects into economy.

The study was performed on data covering the period (2003 - 2012) with respect to the variables of (income tax, oil profits) as independent variables and (private consuming expenditure, private investmental expenditure, and standard figure of prices) as dependent variables. To analyze these data, a number of statistical descriptive and analytical techniques were used such as (percentage, standard variance, mediums, F test, T test and SPSS). It has been c

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 03 2003
Journal Name
Al-academy
اسباب تفرد استخدام خط النسخ في تصميم الحروف الطباعية
...Show More Authors

اسباب تفرد استخدام خط النسخ في تصميم الحروف الطباعية

View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
...Show More Authors

في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5

View Publication Preview PDF
Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Mon Jul 28 2025
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (20)
Crossref (7)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Computer Theory And Engineering
MIPOG - An Efficient t-Way Minimization Strategy for Combinatorial Testing
...Show More Authors

View Publication
Crossref (16)
Crossref