This study aimed at an analytical comparison of the Internal Auditing Standards issued by the Institute of Internal Auditors (IIA) and the Guidance Manual for Audit Units issued by the Federal Audit Bureau to show the compatibility and differences between them and the possibility of applying the IIA standards to economic units in Iraq. The guideline was generally not covered by all the internal audit units. There is a lack of keeping pace with changes in internal auditing at the international level and there is a need to strengthen the Guideline on Internal Auditing Standards II A), which is characterized by the preparation of an internal document containing the objectives, powers and responsibilities of the internal audit work as well a
... Show MoreThis study aims to isolate the pathogenic yeasts from genital tract and investigate their relationship with the age .The results clarified that the most pathogenic yeast isolated from genital tract was Candida albicans , also the results of C.albicanas isolates susceptibility test, to different antifungal revealed that they were sensitive to Miconazole, Ketoconazole and Clotrimazol and were resistant to Nystatin and Grisofulvin. The study of relationship of vaginal infection with the age showed that the incidence of infection with Candida was high among females age group (19-39 years).
The study sought to highlight the importance of applying the administrative control procedures which play an important role in assessing the performance of the employees of the tax administration and specifically the companies department by setting the standards and objectives of the department on the basis of which in the implementation of its work and identify deviations and errors and find appropriate solutions and evaluate the results according to appropriate solutions, The study of the problem of research, namely the extent to which the tax administration applied to the administrative control procedures in view of its importance in evaluating the performance of its employees and the extent of their application to the legislations an
... Show MoreThe study aimed to identify the psychological counseling skills and the strength of the ego in the educational counselors, and to identify the relationship of statistical significance between the psychological counseling skills and the strength of the ego in the educational counselors, and to identify the differences of statistical significance in the relationship between psychological counseling skills and the strength of the ego in the guides according to the gender variable(male, Females), the number of sample (100) guides, including (50) males and (50) females from the area of Atifiya and Qadissiya and Ameriya in the Directorate of Education Karkh / 1, the researcher adopted a scale of psychological counseling skills prepared b
... Show Morerepresent websites link support of human communicate and cohesion of cultures different depending on their languages and their environments around, it was the evolution of one of the most important means of communication of services for electronic networks, the Internet active role in containing the world Bbodqh science and knowledge to Taatlaqah cultures from which derives its intellectual and cognitive cupboards continuity and as a link language for each those environmental Altdadat, linguistic, religious, political, economic . We all know that these electronic means difficult promise ring intellectual and mental connectivity for the masses polarized without being of the image as an element Kravekaa supporter of the electronic media an
... Show MoreLimited importance of research in a stand on the most important difficulties faced by both faculty and parents to communicate with each process to follow up on their children, and the analysis and inventory of the obstacles that hinder the educational process, and work to develop a vision of how to address these constraints and the important role of technology in the treatment of problems of the society so as to develop frameworks future to minimize the errors and the problems they face, and the development outlook for future generations in order to promote the educational level, especially that Iraq is going through a change in conditions in all sectors. Through the questionnaire, which includes questions set that was made on a sample o
... Show Morewell log analysis is used to determine the rock properties like porosity, water saturation, and shale volume. Archie parameters in Archie equation, which sometimes considered constants greatly affect the determination of water saturation, also these parameters may be used to indicate whether the rocks are fractured or not so they should be determined. This research involves well logging analysis for Zubair formation in Luhais field which involves the determination of Archie parameters instead of using them as constant.
The log interpretation proved that the formation is hydrocarbon reservoir, as it could be concluded from Rwa (high values) and water saturation values (low values), the lithology of Zubair from cro
... Show MoreAbstract:
One of the most prominent historical stage feature that is well- known
nowadays in the world is democracy issue. This issue gives man the right to
reflect his concept and notions . It,s the world of freedom , human right and
liberation of women. This leads to the principle of equality between women
and men which is put in the top of liberty and Improvement lists .
Improvement can be defined as a group of means and ways that is
used to direct human work to improve their level of life economically and
socially .
This study contains three sections, the first presents the social state of
women in pre-history period . And the second section presents the theory of
improvement as an important social ph
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More
