Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
The researcher tried to show the importance of obligation with the rules of professional conduct set by the Association of Accountants and Auditors of Iraqis when expressing an opinion the financial statements submitted tax administration and enhance the confidence of these lists, and adopted in the tax settling accounts process and its impact on tax revenues, and touched a researcher at the theoretical side of the search to the problem of research and of my Is there a trace of non- not to obligation by the rules of professional conduct in Iraq affect the tax revenue with the rules of professional conduct in tax revenue for companies research sample, the research aims to study the rules of professional conduct set by the Associatio
... Show MoreIron deficiency is considered as a common problem facing the general world population. In the current research, experiments were conducted to evaluate the effects of aqueous extracts of Acacia senegal (Gum Arabic, GA), Spinacia oleracea (spinach), Zea mays (corn), and Capsicum annuum (red chili pepper) on iron and ferritin levels in rats. Vitamin C and fructose levels were first estimated in these plants by using High-Performance Liquid Chromatography (HPLC). The results showed that the GA extract contained the highest level of fructose (853 mg.L-1), followed by red chili pepper (635 mg.L-1), corn (521 mg.L-1), and spinach (271 mg.L-1
... Show MoreThe influence of culture on accounting systems and practices, including financial reports and accounting information through the values identified by Gray and derived from social-cultural values, and the four accounting values were derived from generally accepted accounting principles represented by (Conservatism, Uniformity, Secrecy, and Professionalism). Important and significant in maximizing financial performance, and measuring the extent of the role of these values in improving financial performance through attention to the values of accounting culture, this research
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Dust storms are among the most important weather phenomena in Middle East. The Shamal dust storms are dominated across Iraq and the whole Middle East, especially in summer. However, frontal type of dust storms is possible in winter and spring. In this research, a comprehensive case study was conducted to a dust storm that occurred on 20 March 2016 from many perspectives: synoptic, satellite imagery, dust concentration analysis, visibility reduction, and aerosol optical depth. The study shows that the dust storm initiated inside Syria and moved eastward with the movement of the front. Dust concentrations and aerosol optical depth were also discussed that simulate the dust storm over Iraq in a reasonable way with some differences. The dust
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreSummary:
This research revolves around the probing of those whom Ibn Hajar said, "He has a vision", its significance, and the ruling on the connection and transmission to it. The number of narrators reached fifty-one (51) narrators, among whom it was said, “He has a vision, whether it is definite or possibly. Some of them had a vision and companionship.”They are eleven (11) narrators, And among them were those who had visions and had no company, and their number was twenty-one (21) narrators, and among them were those who had no vision and nor company, and their number is nineteen (19) narrators.
As a result , whoever said about him “has a vision” and has companions, his hadith is connected, even i