In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreThis study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that
In this research an Artificial Neural Network (ANN) technique was applied for the prediction of Ryznar Index (RI) of the flowing water from WTPs in Al-Karakh side (left side) in Baghdad city for year 2013. Three models (ANN1, ANN2 and ANN3) have been developed and tested using data from Baghdad Mayoralty (Amanat Baghdad) including drinking water quality for the period 2004 to 2013. The results indicate that it is quite possible to use an artificial neural networks in predicting the stability index (RI) with a good degree of accuracy. Where ANN 2 model could be used to predict RI for the effluents from Al-Karakh, Al-Qadisiya and Al-Karama WTPs as the highest correlation coefficient were obtained 92.4, 82.9 and 79.1% respectively. For
... Show MoreBackground: There is a strong desire of adolescent to have a peer group and to be appreciated and also to become a member of this group which can affect one each other. There for; encourage, adapting,and imitating of friends and group consider as the main reasons behind starting of smoking among youngsters. Smoking habits in the family were found tobe acause of smoking pressure among adolescentas peer pressure. Smoking habit may be started before 18 years of age in most adult smokers.
Objectives: To study the effect of peer pressure and family smoking habiton the prevalence of smoking among secondary school students.
Type of the study: A cross
... Show MoreThis study is concerned with the effect of adding two kinds of ceramic materials on the mechanical properties of (Al-7%Si- 0.3%Mg) alloy, which are zirconia with particle size (20μm > P.S ≥ 0.1μm) and alumina with particle size (20μm > P.S ≥ 0.1μm) and adding them to the alloy with weight ratios (0.2, 0.4, 0.6, 0.8 and 1%). Stirring casting method has been used to make composite material by using vortex technique which is used to pull the particles to inside the melted metals and distributed them homogenously.
After that solution treatment was done to the samples at (520ºC) and artificial ageing at (170ºC) in different times, it has been noticed that the values of hardness is increased with the aging time of the o
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThe developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei
... Show More