The process of evaluating and measuring tax performance is critical to support the tax collection process. The comparison of the amount of revenue collection with what is expected and the process of measuring tax performance continuously by the tax administration leads to increase the collection of tax, determine the size of deviations and stand and know the reasons and take the necessary measures to address them to get a better result in the future. According to the different tasks assigned to them, criteria and indicators for measuring the tax performance vary from one organization to another. These are indicators or criteria that measure tax revenue (i.e., amounts). One of the research's main findings was to raise the tax collection level, increase the number of employees to get good performance, and impose sanctions on tax evaders. They are detecting the manipulators with the other accounts submitted to the General Authority for Taxes to evade the tax and achieve the taxpayers' greatest possible profit. The most important recommendations reach the research. The attempt to introduce technology and advanced information systems to cope with developments in the field of taxation, to give more importance to the process of assessment and measurement of tax performance because of the positive impact in the process of collection of tax collection.
Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on
... Show MoreAccurate computation of the roughness coefficient is important in the studies of open channel flow. To measure and identify the hydraulic characteristics of the flow system, the model simulation is necessary to study and get the results of the hydraulic properties to specify Manning coefficient of the Euphrates River. In this study, the reach is extended along the Euphrates River from Haditha Dam to Ramadi Barrage with a distance of 169km. The HEC-RAS model was implemented to simulate the flow within the study reach. The geometry of the river was represented by more than two hundred cross-sections surveyed in 2013 and 2021. The model was calibrated using some observed discharges at the Heet gage station for records of th
... Show MoreAn experimental study was conducted to evaluate the effect of AL-coholic extract alkaloid of Cordia myxa leafs in fourth larval stage of lesser grain borer Rhyzopertha dominica. Using alkaline extracts of 8%, the study has been shown clear effect increased in mortality rate for fourth larval stage 93.3% and degressed to 66.6% at 4% concentrate to 13.3% with control treatment .Ahigher percentage of pupal mortality 16.6% at 4% concentrate has been observed, while no natural emergence carried out at concentrates of 4.6% comparing with control treatment of 86.66%, at the same time percentage of deformation has been increased to 16.66% at 4% of extracts and degressed to 6.66% at 6% while no deformation have been shown with control treatment .
... Show MoreAbstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More