Preferred Language
Articles
/
PxeMTo4BVTCNdQwCE0Er
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity Distribution (GCBED) of Baghdad, owned by the Iraqi federal government. The Statistical Package for the Social Sciences (SPSS) software was employed to analyse the data and hypotheses. The study concluded that there is a substantial effect on the performance of EIA depending on the COBIT framework in reducing electronic audit risk in GCBED. According to the findings, additional research should be undertaken to improve efficiency, accounting control efficiency, and asset protection programs to lessen audit risk.

Scopus Crossref
View Publication
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Impact of Aggregate Gradation and Filler Type on Marshall Properties of Asphalt Concrete
...Show More Authors

As asphalt concrete wearing course (ACWC) is the top layer in the pavement structure, the material should be able to sustain stresses caused by direct traffic loading. The objective of this study is to evaluate the influence of aggregate gradation and mineral filler type on Marshall Properties.  A detailed laboratory study is carried out by preparing asphalt mixtures specimens using locally available materials including asphalt binder (40-50) penetration grade, two types of aggregate gradation representing SCRB and ROAD NOTE 31 specifications and two types of  mineral filler including limestone dust and coal fly ash. Four types of mixtures were prepared and tested. The first type included SCRB specification and

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Impact of Different Levels of Insulin on Cryopreservation Local Roosters Stored Semen Biomarkers
...Show More Authors
Abstract<p>The aim of this research to examine the impact of different level of Insulin certain biomarkers of local roosters semen after being cooling for varying lengths of periods, roosters semen pooled, diluted with extender, and distributed randomly among five groups: Diluted semen put through the semen cryopreservation technique; the control treatment (C1) 0 insulin; (C2) contained 4 IU/insulin; (C3) contained 5 IU/insulin; (C4) contained 6 IU/insulin; and (C5) contained 7 IU/insulin. After 0, 24, 48 and 72 hours, cooling semen were evaluated for plasma membrane integrity(MI), acrosome integrity(AI), malondialdehyde (MDA) and total antioxidant capacity (TCA). The result showed significant d</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The cognitive complexity of the leaders and their impact on the organizational flexibility of field research at the company's headquarters for the distribution of petroleum products
...Show More Authors

The present research aims to test the effect of cognitive complexity as an independent variable in organizational agility as a responsive variable among the leaders working at the headquarters of the Iraqi Petroleum Products Distribution Company.

 To conclude a number of recommendations that contribute in the organizational agility in the company, and due to the importance of this research in public organizations and its notable role in community organizations. The research was carried out on a random sample of 101 individuals out of a total of 308, which represents the high leaders in the company (general managers, head of departments, and division officials). A questionnaire was used as information

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The added value of internal audit and its role in achieving independence and responsibility: applied research in the Rafidain State Company for Dams implementation
...Show More Authors

The added value of internal audit greatly contributes to adding value to the institution, but most departments of economic units in Iraq neglected the role of internal audit and the added value that can be achieved by those institutions, since the term added value of internal audit is a relatively vague term from the premise that what cannot be measured is difficult Determine it, and perhaps descriptive standards for it is the extent of compliance with international auditing standards (IIA).

The research aims to study the procedures and results of auditing to verify that they have given an added value to the audit with a positive impact, develop its aspects and research, identify deficiencies for the audi

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Ieee Access
Low-Distortion MMSE Speech Enhancement Estimator Based on Laplacian Prior
...Show More Authors

View Publication
Scopus (42)
Crossref (39)
Scopus Clarivate Crossref