Preferred Language
Articles
/
jeasiq-1035
Integrating the role of internal and external audit to ensure the success of the assessment methodSelf-General Authority of Taxation
...Show More Authors

المقدمة

تتعامل الجهات الضريبية في مختلف دول العالم بأساليب عديدة لجباية الضرائب من المكلفين بغض النظر عن فئات وأصناف هؤلاء المكلفين،وفي العراق تم اعتماد العديد من الأساليب لجباية الضرائب على امتداد المدد الزمنية المتعاقبة،وكان لأسلوب التقدير الذاتي وهو أحد تلك الأساليب مجالاً للتطبيق خلال مدة زمنية معينة،حيث جرى تطبيق هذا الأسلوب على وحدات اقتصادية معينة، وبالرغم من المساوئ التي قد ترافق تطبيق هذا الأسلوب فإن له مزايا عديدة تجعله يصلح للتطبيق بعد نشر الوعي الضريبي بأهمية وفوائد هذا الأسلوب، والتوعية بدعم الجهات المساندة للتشجيع على تطبيقه ومن هذه الجهات نقابة المحاسبين والمدققين وديوان الرقابة المالية

ومكاتب التدقيق و....الخ.

وللتدقيق مجال مهم في إنجاح تطبيق أسلوب التقدير الذاتي من قبل الهيئة العامة للضرائب، سواء أكان التدقيق داخلياً أم خارجياً، فالمدقق الداخلي له الدور المهم في إعطاء صورة حقيقية لواقع المكلفين الذين يقدمون إقراراتهم الضريبية وتوضيحها وتبريرها أمام إداراتهم الضريبية.

وكذا الحال بالنسبة للمدقق الخارجي فإن تلك الإقرارات لا تُعتَمد من قبل الهيئة إلا بعد المصادقة عليها من قبل المدقق الخارجي أي مراقب الحسابات، وهذا ما يجعل المسؤولية تضامنية بين المكلف والهيئآت الضريبية والمدققين.

ولأجل توضيح ما لهذا الأسلوب من أهمية في تحديد الوعاء الضريبي للمكلف ،وما للجهود التي يبذلها المدققون في إنجاح هذا الأسلوب،كان لا بد من إبراز ذلك في ستة محاور، تضمن الأول المنهجية الخاصة بالبحث،أما المحور الثاني فيوضح أسلوب التقدير الذاتي، والثالث جاء بالدور الذي يؤديه التدقيق الداخلي في إنجاح هذا الأسلوب، أما الرابع فبين دور التدقيق الخارجي في إنجاح هذا الأسلوب، في حين إن المحور الخامس يوضح الجانب العملي للبحث حيث يبين أهمية هذا الأسلوب من خلال تكامل جهود المدققين في إنجاح تطبيقه في الهيئة العامة للضرائب،وجاء المحور السادس بالاستنتاجات والتوصيات الخاصة بالبحث.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental Study for Materials Prosthetic above Knee Socket under Tensile or Fatigue Stress with Varying Temperatures Effect
...Show More Authors

The residual limb within the prosthesis, is often subjected to tensile or fatigue stress with varying temperatures. The fatigue stress and temperatures difference which faced by amputee during his daily activities will produces an environmental media for growth of fungi and bacteria in addition to the damage that occurs in the prosthesis which minimizingthe life of the prosthetic limb and causing disconfirm feeling for the amputee.

In this paper, a mechanical and thermal properties of composite materials prosthetic socket made of different lamination for perlon/fiber glass/perlon, are calculated by using tesile test device under varying temperatures ( from 20oC to 60oC), also in this paper a device for measuring rotational bendin

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Modern Mathematical Sciences
Coupled Laplace-Decomposition Method for Solving Klein- Gordon Equation
...Show More Authors

In this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.

Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 10 2018
Journal Name
Al-kindy College Medical Journal
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Some Results on Reduced Rings
...Show More Authors

The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.

View Publication Preview PDF
Crossref