This paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach
... Show MoreThe primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes
The population studies are one of the difficult tasks facing the world in all periods. most of the researchers and who have relationship to population policies and development plans, may have succumbed to the idea that the population problem is based and confined mainly in the rate of increase in population, or the so – called population explosion, and not the content because of its pressure on resources and there is no problem of population if the resources are available and therefore no need for the development and implementation of population policies in any way . While the population policies here should take a range of general and comprehensive in every respect to population and demographic phenomena distribution, not only
... Show MoreThe research paper talks about one of the topics that deals with one of the high-style styles in the Holy Qur’an that carries with it a high and influential style in directing the Qur’anic context, as the verses are singled out with certain words, each of which came out to other meanings, which is what was called in the past “what the wording agreed and the meaning differed Or the so-called “faces and analogues” and the meaning of analogues in the language and the Qur’an; To mention a word in a place and it means a meaning other than the other, and to interpret each word with a meaning other than the other meant by the faces, and accordingly the goal of the research is in the linguistic significance, in order to reveal the tr
... Show MoreThe Results Of Interest In Capitals And Major Cities Have Become Major Attraction Centers For People In Rural Areas And Different Regions, Especially With The Concentration Of Industrial And Commercial Establishments And Public Services, Which Helped To Find The Wide Differences Between Them. Recently, The Trend To Develop Small Urban Centers In Rural Back Areas Great And Serious Attempt To Reduce Inflation. The Suburb Of Abu Ghraib Is One Of The Important Suburbs Near The City Of Baghdad And Through The Study Of The Reality Of The Suburb Shows That The Outcome Of Its Career And Urban Development Lies In Its Mutual Relationship With The City Of The Mother In The Light Of Considerations And Measures Of The Most Important Accessibility And
... Show MoreSubjected Find winged bull Assyrian monetary analysis in order to identify the formative relations in terms of percentages, movement and public swab for being aesthetic values upon which the mechanisms of artistic composition, which did not give researchers artistic interest that affects the status of these sculptures and the like of the achievements of the Iraqi civilization in Assyria.
Resulting analysis to a number of the most important results, the percentages approved in the calculation of the parts to do with all when viewed status horizontal with a realistic formulas while in the case of considering frontally clear for Ras stylized proportions and head size larger in length, a ratio confirmed by previous studies, and
... Show More<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav
... Show Moreهدف البحث إلى التعرف على مستوى الثقافة الغذائية الرياضية لدى عدائي مسافات ركض (400 و800) و(400) متر حواجز الشباب، والتعرف على العلاقة وإسهام وأثر الثقافة الغذائية الرياضية ببعض المؤشرات البيوكيميائية لدى عدائي مسافات ركض (400 و800) و(400) متر حواجز الشباب، أعتمد المنهج الوصفي بأسلوب العلاقات الإرتباطية، و تمثلت حدود مجتمع البحث بالعدائين الشباب لفعاليات ركض (400 و800) و(400) متر حواجز، يمثلون لاعبي الأندية العراقية الب
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More