The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial information through a more equitable distribution of costs on petroleum products to determine the cost per barrel of oil by the company's management.
This research examines the impact of construction technology systems in contemporary architectural production through the study of the evolution in it systems, construction materials and methods of construction in addition to the digital revolution which provided possibilities of structural and architectural design in creating a distinct architectural product, as considered construction systems technology is the source of creativity in the architectural product, the research is assumed that the construction systems technology have achieved a structural innovation in production through the materials and methods of construction and digital design.
For Long time technology was connected to the
The aim of the present research is to know the following : What are the Science and technology, society and environment issues (S.T.S.E) which included in the content of thechemistry Book second grade intermediate ? And to achieve the objective of search The two researchers has prepares a list of science and technology, society and environment issues (STSE) consisted of (9) key issues namely (Air quality and the atmosphere, sustainable development, water security, health and preventive security, mineral resources investment, pollution of various kinds, energy, food industry, production of weapons technology) and from which (70) sub-issues emerge,Arbitrators competent agreement has been received . Then, thetwo researchers analyzed the con
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
The sculpture composing of iron materials is being considered most important raw material that has been used by the modern artist ,especially period of post –modernism. The works of the two artists ( SALIH AL-QARAGHULI and AHMED AL-BAHRANI) the most important works that entailed to be studied for being using iron material in most of their sculpturing works; in works of Al-Quraghuli, we find ores composing of iron wires , animals threads and remaining of trash and to be assembled in a sculptured text with unique style in Arab Home. Moreover, we find huge works of (al-Bahrani) represented into formations characterized with its ironic flexibility, its abstracted engineering forms. Al-Bahrani solely has used iron plates represented in its
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreThe accumulation of sediment in reservoirs poses a major challenge that impacts the storage capacity, quality of water, and efficiency of hydroelectric power generation systems. Geospatial methods, including Geographic Information Systems (GIS) and Remote Sensing (RS), were used to assess Dukan Reservoir sediment quantities. Satellite and reservoir water level data from 2010 to 2022 were used for sedimentation assessment. The satellite data was used to analyze the water spread area, employing the Normalized Difference Water Index (NDWI) and Modified Normalized Difference Water Index (MNDWI) to enhance the water surface in the satellite imagery of Dukan Reservoir. The cone formula was employed to calculate the live storag
... Show MoreAbstract
Oil is considered a commodity and is still an important and prominent role in drawing and shaping the Iraqi economic scene. The revenues generated from the export of oil are considered the main source of the general budget in cash flows.
Since the revenues consist of quantity and price and the latter is an external factor which is difficult to predict, The effect of any commodity on its price, which is proven in the theory of micro-economic, but it is observed through the research that the response is slow, which means not to take advantage of the rise in prices, by increasing the quantity exported, the result of several facto
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More