Preferred Language
Articles
/
PxeMTo4BVTCNdQwCE0Er
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity Distribution (GCBED) of Baghdad, owned by the Iraqi federal government. The Statistical Package for the Social Sciences (SPSS) software was employed to analyse the data and hypotheses. The study concluded that there is a substantial effect on the performance of EIA depending on the COBIT framework in reducing electronic audit risk in GCBED. According to the findings, additional research should be undertaken to improve efficiency, accounting control efficiency, and asset protection programs to lessen audit risk.

Scopus Crossref
View Publication
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Using the Strategy of Roundhouse in the Achievement of Fourth Grade Students of Computer and Their Attitudes towards It
...Show More Authors

The research aims to identify the effect of using the strategy of Roundhouse on the achievement of fourth-grade students of computer and their Attitudes towards it. The research sample consisted of (61) fourth-grade secondary school students distributed into the experimental group consisted of (31) students study computer according to the Roundhouse strategy, and the control group consisted of (30) students follow the traditional method. The researcher designed an achievement test consisting of (30) items of multiple choice. To measure the attitudes of students towards the computer, a questionnaire of (32) paragraphs with three alternatives was designed by the researcher. The results showed that there is a statistically significant diffe

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
A Modified Fama-MacBeth Model based on the Single-Index Model
...Show More Authors

The aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth.  Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment.  Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Multiwavelet based-approach to detect shared congestion in computer networks
...Show More Authors

Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
International Journal On Engineering, Science And Technology
EEG Neuro-markers to Enhance BCI-based Stroke Patients Rehabilitation
...Show More Authors

Stroke is the second largest cause of death worldwide and one of the most common causes of disability. However, several approaches have been proposed to deal with stroke patient rehabilitation like robotic devices and virtual reality systems, researchers have found that the brain-computer interfaces (BCI) approaches can provide better results. In this study, the electroencephalography (EEG) dataset from post-stroke patients were investigated to identify the effects of the motor imagery (MI)-based BCI therapy by investigating sensorimotor areas using frequency and time-domain features and to select particular methods that help in enhancing the MI-based BCI systems for stroke patients using EEG signal processing. Therefore, to detect

... Show More
View Publication
Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Modified Opposition Based Learning to Improve Harmony Search Variants Exploration
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
“The impact of using the of the Government Finance Statistics Manual (GFSM) on The General Budget in Iraq”
...Show More Authors

This research is aiming  to analyze the impacts of the current budget in Iraq by using  the Government Finance Statistics Manual (GFSM) , the research is based on hypothesis: (There is an impact on the using of the Government Finance Statistics Manual (GFSM) In public budget in Iraq) .This hypothesis was demonstrated by using the questionnaire, a number of conclusions were reached, the most important being the lack of terminology adopted in the government accounting system and the Iraqi financial and accounting manual as a result of their adoption of the monetary basis for the lack of accounting terminology that meets t

... Show More
View Publication
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Partial Differential Equations In Applied Mathematics
Improving the hepatitis viral transmission model’s dynamics by vaccination and contrasting it with the fractional-order model
...Show More Authors

We investigate mathematical models of the Hepatitis B and C viruses in the study, considering vaccination effects into account. By utilising fractional and ordinary differential equations, we prove the existence of equilibrium and the well-posedness of the solution. We prove worldwide stability with respect to the fundamental reproduction number. Our numerical techniques highlight the biological relevance and highlight the effect of fractional derivatives on temporal behaviour. We illustrate the relationships among susceptible, immunised, and infected populations in our epidemiological model. Using comprehensive numerical simulations, we analyse the effects of fractional derivatives and highlight solution behaviours. Subsequent investigatio

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Dec 22 2023
Journal Name
Eastern-european Journal Of Enterprise Technologies
Evaluating the impact of structure parameters on the acoustic performance of an exhaust muffler with shells
...Show More Authors

Recently, environmental noise has arisen from various sources, such as those from exhaust mufflers of combustion engines found in cars, trucks, or power generators, which produce significant noise during their operation. Controlling the radiated noise from these mufflers is a major factor in improving acoustic comfort and minimizing the impact on the surrounding communities. Numerous research has been presented for this reason by modification of the internal structure of the exhaust muffler. The main objective of this work is to reduce the noise level emitted from exhaust mufflers. This can be achieved by adjusting structure parameters to attenuate the surrounding environment's radiated noise. Analysis of pressure-wave propagation h

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Doctrinal monotheistic modeling of religion: the impact of the political aspect on Islamic sources and books
...Show More Authors

         The political system in Indonesia, since gaining independence from the Dutch colonialism on the seventeenth of August 1945, has gone through long stages. The Indonesian constitution stipulated that the country is based on a democracy. In 1956 the first free elections were held in Indonesia, and President Sukarno announced the adoption of the directed democratic system Then, during the era of President Suharto, the state entered a phase called democracy based on the Five Pancasila principles, which is a false democracy because it served the interests of Suharto, who in his long reign had political and economic corruption leading up to 1998, when the Indonesian people revolted, and the government of Soeharto was overthrown

... Show More
View Publication Preview PDF
Crossref