Preferred Language
Articles
/
ijs-3919
Identifying Digital Forensic Frameworks Based on Processes Models
...Show More Authors

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the international auditing standard IAS 540 "Auditing accounting estimates and related disclosures" in limiting income smoothing practices in the financial statements (from the point of view of Iraqi auditors)
...Show More Authors

                The current research aims to show the impact of the international auditing standard IAS 540 in reducing income smoothing practices in Iraq. To achieve the objectives of the research, the researcher adopted a questionnaire for a sample of auditors in Iraq. Where 60 forms were distributed and after the questionnaire was retrieved and statistical analysis was done using the SPSS program, The research reached a number of results, the most important of which are: the existence of a statistically significant effect of the application of the international auditing standard IAS 540 in reducing income smoothing practices, The research recommended the necess

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing audit procedures in accordance with the international assurance standard through the implementation of a proposed program
...Show More Authors

Abstract:             

                  The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 27 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The extent to which the Iraqi environment responds to the requirements of IAS 12 in determining income tax: بحث تطبيقي في الهيئة العامة للضرائب/ قسم الشركات
...Show More Authors

The importance of this research comes from the possibility of achieving positive interaction between accounting and tax through the interest in setting accounting standards and adapting them to local tax legislation, as the adoption of the application of the international standard (IAS 12) for income taxes helps to measure and determine the base for income tax and may lead to an increase in the tax outcome. Through the reliance of enterprises on many accounting bases, and that the tax administration in Iraq depends on the element of personal judgment in determining the tax base, which leads to lack of objectivity in determining the tax outcome, as the impact of the accounting standard (IAS 12) on the tax base and tax outcome is one of th

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simultaneous Quantitative Determination of Ciprofloxacin and Hydrocortisone by H-Point Standard Addition Method
...Show More Authors

Ciprofloxacin (Cip) and hydrocortisone (Hyd) were simultaneously measured as hydrochloride and sodium succinate, respectively, using the H-point standard addition method (HPSAM). The approach can precisely identify Cip in the presence of Hyd with various analyte-to-interference ratios (5:5, 5:10, 10:5, 10:10) µg.mL-1, in mixed samples containing (1-5µg.ml-1) of Cip, at the wavelengths of (236 and 257) nm. In the same way, Hyd was analyzed in the presence of Cip in different analytes with an interference ratio of (5:5, 5:10, 10:5, 10:10) µg.mL-1, in mixed samples containing (1-5 µg.mL-1) of Hyd, at wavelengths of (266 and 278) nm. The satisfactory results show good reproducibility of the dev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Level of Academic Achievement and its Relationship with Some Characteristics of Female Students at College of Education for Girls in Baghdad University: The Level of Academic Achievement and its Relationship with Some Characteristics of Female Students at College of Education for Girls in Baghdad University
...Show More Authors

 

Abstract

Personality is one of the most important elements that should be developed in university student. Thus, we have to develop the positive traits and neutralize the negative traits of students as well as we have to pay attention to the level of student achievement at the same time, the researcher designed a scale to measure the traits of study sample. The research come out with a number of recommendations and proposals, the most important of which Enhancing the positive characteristics of university students in order to reach them to the level of mature personality with mental health. Enhancing the positive role of the high level of achievement by motivating the stude

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Characterization of the Groundwater within Regional Aquifers and Suitability Assessment for Various Uses and Purposes-Western Iraq
...Show More Authors

Groundwater quality investigation has been carried out in the western part of Iraq (west longitude '40°40). The physicochemical analyses of 64 groundwater samples collected from seven aquifers were used in the determination of groundwater characterization and assessment. The concept of spatial hydrochemical bi-model was prepared for quantitative and qualitative interpretation. Hydrogeochemical data referred that the groundwater is of meteoric origin and has processes responsible for observed brackishness. The geochemical facies of the groundwater reveal that none of the anions and cations pairs exceed 50% and there are practically mixtures of multi-water types (such as Ca–Mg–Cl–HCO3 and Na+K–SO4–Cl water type) as do

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
𝝎Mc –functions and 𝑵Mc-functions
...Show More Authors

In this paper, we presented new types of Mc-function by using 𝜔-open and 𝑁-open sets some of them are weaker than Mc-function and some are stronger, which are 𝜔Mc-function, M𝜔c-function, 𝜔M𝜔c-function, 𝑁Mc-function, M𝑁c-function and 𝑁M𝑁c-function, also we submitted new kinds of continuous functions and compact functions and we illustrated the relationships between these types. The purpose of this paper is to expand the study of Mcfunction and to get results that we need to find the relationship with the types that have been introduced.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System
...Show More Authors

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi

... Show More
View Publication Preview PDF
Crossref