Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.
Experience the Islamic financial industry faces many challenges, most notably the lack of proper risk management tools that meet the requirements of legality and economic efficiency advantage from another side, so it requires the search for innovative ways to manage the risk of Islamic banking, Islamic finance industry is manufacture up-to-date, if compared with the financial industry (traditional), which increases the problematic of risk management in the Islamic financial industry nature of treatment which should be compatible with Islamic law, as well as economic efficiency, thereby Progress came the importance of research to highlight the entrance to Islamic financial engineering and the goals sought to be achieved through the use of
... Show MoreAbstract:
The research aims to achieve the basis of tax justice by making a comparison between the tax accounting process according to the application of the International Financial Reporting Standard IFRS15 and the tax accounting procedures currently used in the General Authority for Taxes to determine the annual and total tax differences, to give credibility and enhance transparency in the reports and financial statements of companies Long-term contracts when prepared in accordance with the requirements of applying the international standard IFRS15 “Revenue from Contracts with Customers”, which increases the possibility of relying on them when calculating taxes. Thus, the resea
... Show MoreThe study aims to verify the independence of auditors working in companies and offices of the Iraqi audit, and measure the level of accounting conservatism in the financial statements of banks and insurance companies listed on the Iraq Stock Exchange, as well as a statement after the independence of the auditor on accounting conservatism in the financial statements of banks and insurance companies listed on the market Iraq Stock Exchange, as it has been measuring the independence of the auditor using the survey form was auditors working in the Iraqi audit firms were measured the level of accounting conservatism for companies sample using a form( Basu) was a statement after variables through the use of statistical models in a mann
... Show More—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.