This study aimed to know the impact of the capital structure measured by the ratio of financing to short-term capital and the ratio of financing to long-term capital on the profitability of companies, as measured by the rate of return on assets and the rate of return on equity. The study was applied to industrial sector companies listed in the Iraq Stock Exchange. The financial number of (14) companies, and (4) companies were selected that met the conditions for selecting the study sample. The study methodology relies on the analytical method as it is more appropriate to the nature, scope and objectives of the study, and the ready-made statistical program "SPSS" will be used to analyze the relationships and influence between the
... Show MoreAbstract
The research seeks to shed light on green accounting information systems, analyze them, identify sustainability reporting and how to improve it, as well as study the importance of the Iraqi oil sector, analyze it, and work on applying green accounting information systems in order to improve the quality of sustainability reporting. Oil as a branch of the General Corporation for the Distribution of Oil and Gas Products to apply the practical aspect and prove the hypothesis of the research. Explaining the company's role in improving environmental conditions
Many important archaeological sites in Iraq still need to be preserved. Some of these sites were subjected to destruction and negligence. So, exploring these sites represents a priority for its protection. A 2D Electrical Resistivity Imaging (ERI) as a non-invasive geophysical survey method was implemented at a part of the Borsippa archaeological site near Babylon to search for the subsurface archaeological artefacts/structures. Electrical resistivity measurements were carried out using a Dipole-Dipole array. Steps were taken to process and filter using Horizontal profiles, forward modelling, and 2D inverse models to analyze the resistivity measurements. The ERI inversion results show that the superficial conductive zone produced va
... Show MoreThe species of Cr (III), Cr (VI) in biological samples and V(IV), V(V) in foods & plants samples were determined by spectrophotometric methods. Integrated spectral studies of complexes [Cr (III, VI)-DPC], [Cr (VI)-bipy], [VO-SH], [V (V)-8-HQ] which included a study of the optimum conditions for the complexes formation by the investigation of the chemical and physical variables affecting each complex formation, the nature of complexes, the preparation of calibration curves of the complexes and treated the resulted data by modern statistical methods and study the interfering species. Interferences were removed to explain the reactions thermodynamically by determining Ecell, Keq. and ∆G values and includes a study of
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More