نتيجة للتطور و انفتاح الاسواق الاقتصادية عالميا ظهرت اهمية الافصاح في القوائم المالية و اعدادهايكونمبني على ( العدالة و الشفافية ) في اظهار البنود الواردة فيها ، و لان هذه القوائم تعد لا كثر من جهة مستفيدة ( اصحاب المصلحة ) سواء كانوا مستثمرين او مقرضين او هيئات حكومية حيث يجب اعدادها بطريقة اكثر شفافية و بدون تحيز لجهة دون اخرى ،هدفت الدراسة الى التعرف على اهم الفروقات الضريبية المؤجلة التي تنشأ في الوحدات الاقتصادية وقياس مدى تأثيرها على القوائم المالية ، واثبتت الفرضية القائمة على " مدى تأثير الفارق الزمني في تسجيل المعاملات المالية في توليد الفروقات الضريبية المؤجلة " من خلال استخدام منهج البحث الاستنباطي و التحليلي وتم التوصل الى مجموعة النتائج ابرزها ،اهمية الافصاح المحاسبي عن فروقات الضرائب المؤجلة ، من اجل جذب المستثمرين المرتقبين و اثر الفروقات الضريبية المؤجلة على قائمة الدخل من خلال الضريبة المؤجلة والحالية يجب أن يعترف بها كإيراد أو مصروف وأن تتضمن في الربح المحاسبي.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreAbstract:
This research sheds light on the major sins (fornication and sodomy) as two crimes that are prohibited by the divine laws, including its conclusion by the Islamic Sharia. Major sins so that life and the universe are organized, and the individual lives a life of chastity and purity free of filth and filth. The Islamic message included a set of preventive measures and remedial methods that, if the ummah were to apply them, they would live a decent life full of noble goals.
تعد ظاهرة الصراعات ظاهرة قديمة كقدم الوجود البشري وهذا يطبق على المستوى الدولي مما يجعل الدول الصغرى هي ساحة تصفيات كما هو الحال في سوريا مما يجعل الامن الانساني فيها معدوم
أن تكوين المودود شكل (1) فى منطقة الدراسة يعتبر من التكاوين المهمة فى منطقة الخليج العربى وايران . لقد تم وصف هذا التكوين لاول مرة من قبل (1) فى المقطع المثالى فى بئر ( دخان -1 ) والذى قسمة الى قسمين رئيسين . القسم الاعلى يتكون من حجر جيرى حامل للدمالق اما القسم الاسفل فهو صلصالى .
This research deals with study and analyze the industrial buyer behavior and identified its objectives by determine the nature of selection the members of the purchases committees and determine the role of the purchases committees to provide requirements of the educational and scientific process and knowledge Impact of the factors ( environmental , organizational , social , and individual ) and positions of the purchase in the behavior of the members of the purchases committees and starts the importance of research in it helps university administrations in the correct choice for the members of the purchases committees and gives a picture of professional conduct professional who is supposed to b
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreThe Isolated Combustion and Diluted Expansion (ICADE) internal combustion engine cycle combines the advantages of constant volume combustion of the Otto cycle with the high compression ratio of the Diesel cycle. This work studies the effect of isolated air mass (charge stratification) on the efficiency of the cycle; the analysis shows that the decrease of isolated air mass will increase the efficiency of the cycle and the large dilution air mass will quench all NOx forming reactions and reduce unburned hydrocarbons. Furthermore, the effect of Fuel / Air ratio on the efficiency shows that the increase of Fuel / Air ratio will increase efficiency of the cycle.
The aim of this research is to find the impact of the efficiency of Management information systems (MIS) on the effectiveness of governmental organizations performance.
To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research attemped to answer the following question: To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research tried to answer the following question: What is the actual utilization of modern admi
... Show MoreA true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems