The research aims to measure, assess and evaluate the efficiency of the directorates of Anbar Municipalities by using the Data Envelopment Analysis method (DEA). This is because the municipality sector is consider an important sector and has a direct contact with the citizen’s life. Provides essential services to citizens. The researcher used a case study method, and the sources of information collection based on data were monthly reports, the research population is represented by the Directorate of Anbar Municipalities, and the research sample consists of 7 municipalities which are different in terms of category and size of different types. The most important conclusion reached by the research is that there is a variation in the efficiency values of the municipalities of the research sample through the presence of efficient and inefficient municipalities, and that the degree of technical efficiency and volumetric efficiency increases in large municipalities with high varieties and decreases in small municipalities with low varieties. Finally, the research recommends the necessity of choosing the research sample from the municipalities with close varieties such as the excellent and first categories, the first and second categories, the third and fourth categories, or only similar categories, This suggestion to ensure more accurate and realistic results, and to use the efficiency index directed towards the outputs in light of the returns of the variable size (VRS-OO) to measure the efficiency of the municipal sector.
The goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show MoreThe purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in
... Show Moreيهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة في العراق وفقاً لنظرية الذكاءات المتعددة عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر الذكاءات المتعددة في محتوى كتابي الحاسوب المقرران على طلبة المرحلة المتوسطة (الصفين الأول والثاني) للعام الدراسي (2017-2018) م؟ ولتحقيق هدف البحث اتبعت الباحثة منهج البحث الوصفي التحليلي (تحليل المحتوى)، واعتمدت الفكرة الصريحة وحده للتسجيل، أما أداة البحث فهي أداة
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe current study aimed to investigate the viability of biofilm formation klebsilla pneumoniae and Staphylococcus aureus. 440 urine samples were collected from patients suffering from urinary tract infection (UTI) from those who were admitted and visitors to Al-Ramadi Teaching Hospital, Al-Yarmouk Teaching Hospital, Al-Ramadi Teaching Hospital for women and children and , Teaching Laboratories in the Medical City for both genders for a period extended from 5 July, 2017 to 10 October, 2017. Samples were diagnosed by culturing them on a selective media and by biochemical testes , also, diagnosis was ensured by using VITEK-2 compact system. Results showed that K.pneumoniae isolation ratio was 17.1%(68) and S.aureus ratio was 13.1%(52). Thei
... Show MoreAn experimental study was conducted to evaluate the effect of AL-coholic extract alkaloid of Cordia myxa leafs in fourth larval stage of lesser grain borer Rhyzopertha dominica. Using alkaline extracts of 8%, the study has been shown clear effect increased in mortality rate for fourth larval stage 93.3% and degressed to 66.6% at 4% concentrate to 13.3% with control treatment .Ahigher percentage of pupal mortality 16.6% at 4% concentrate has been observed, while no natural emergence carried out at concentrates of 4.6% comparing with control treatment of 86.66%, at the same time percentage of deformation has been increased to 16.66% at 4% of extracts and degressed to 6.66% at 6% while no deformation have been shown with control treatment .
... Show MoreLaboratory studies were conducted at the biological control unit, college of Agriculture, University of Baghdad to evaluate some biological aspects of the predator Chilocorus bipustulatus (Coleoptera: Coccinellidae), which is considered one of the most important predators on many insect pests, especially the scale insect, Parlatoria blanchardi, (Homoptera: Diaspididae) on date palms. The results showed that biological parameters of the predator were varied according to different degree of temperature. Egg incubation period was significantly different and reached to 7.5 and 5.44 day at 25 and 30°C respectively, Fertility was the same 100% at both temperature degrees. Larval growth periods were 17.41 and 16.12 day as well as the mortality
... Show MoreThe study aims to measure the level of academic stress in the e-learning environment in three areas, students and their dealing with classmates, dealing with the professor and technical skills, and the nature and content of the curriculum among graduate students in the College of Education at King Khalid University during COVID-19 pandemic. This study was descriptive in nature (survey, comparative). The sample consisted of (512) male and female graduate students in the master's and doctoral programs. The Academic Stress Scale in the E-learning Environment designed by Amer (2021) was used. The results indicated a high level of academic stress among graduate students in the e-learning environment. The study also found that there were stati
... Show MoreAbstract
Objective / Purpose: Online social relationships through the emergence of Web 2.0 applications have become a new trend for researchers to study the behavior of consumers to shop online, as well as social networking sites are technologies that opened up opportunities for new business models. Therefore, a new trend has emerged, called social trade technology. In order to understand the behavioral intentions of the beneficiaries to adopt the technology of social trade, the current research aims at developing an electronic readiness framework and UTAUT model to understand the beneficiary's adoption of social trade technology.
Design/ methodology/ Approach: To achieve the obje
... Show MoreAbstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show More