Preferred Language
Articles
/
jeasiq-1071
Using Benford’s law to detecting earnings management Application on a sample of listed companies in the Iraqi market for securities
...Show More Authors

 

Abstract

The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users  of financial statements who depend on reported earnings in their decisions. Because it did not honestly reflect the operational results of the companies, therefore are resorting to Benford’s Law  is use to identify the companies that might be manage their earnings management , Where is this law is conceded   one of the monitoring tools that have been used to detect the risk of earnings management , we Use Benford’s law to detect the companies that practiced earnings management in a sample of listed companies in the Iraqi stock exchange , The sample consisted of (61) companies from  the (87) companies Listed on the market for the year  2010 , We concluded that  there are a number of companies that practiced earnings management

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (297)
Crossref (269)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Acta Facultatis Medicae Naissensis
The Factors Influencing the Risk of Perforation in Patients with Peptic Ulcers: A Cross-Sectional Study from Central Iraq
...Show More Authors
Abstract<p>The aim of this study was to evaluate the risk factors that influence the perforation, regardless of the presence of H. pylori infection, in a sample of Iraqi patients with peptic ulcers, admitted to Al-Kindy Teaching Hospital. A total of 90 patients who had perforated peptic ulcer participated in this study. The diagnosis was based on history, clinical examination, laboratory and radiological investigations and was confirmed intraoperatively. A number of probable risk factors for perforation were investigated. Eighty participants were males and 10 were females (male to female ratio 8:1). About 42.2% of patients were in their fifth decade of life. Forty-nine (54.4%) patients were asymptomatic be</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
The Death Scene in the "Ayniyah" Poems of Abi Thuayib Al-Huthali and Suda bint Shamardal: A Contrastive Study
...Show More Authors

This study is an objective literary study of the poems of Abu Dhu'ayb Al-Hudhali and Su'da Bint Al-Shamrdal. It aims to shed light on the philosophy of death in the poems, and the way this philosophy is treated by both poets. Thus, the main prominent poetic images have been addressed and the outstanding ones have been singled out. The study further investigates the intertextuality with other poetic verses and Quranic verses and reviews the deviation in their semantic, syntactic, and phonetic types. The study adopts the historical approach to examine the occasion of the poems by referring to several historical sources that indicate the seniority. It also adopts the and descriptive-analytical approach represented by the use of content anal

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 25 2025
Journal Name
Modern Sport
Precision tracking and visual animation and its relationship to the results of the competition with the Sabre Players.
...Show More Authors

In order to get advanced results, we must stand at the pointsthat have been observed by the trainers that are of significance inthe sport of fencing and concern for capacity optical (traceoptical and precision visual animation), so we must learn some ofthese types of capacity, whichever is more influential in the gamefencing so that they add a new axis to the player to pick andchoose in order to achieve the desired goal and raise the level ofthe game.The study aimed to identify the relationship between the visualtracking and accuracy of visual animated face and the results ofcompetitions Sabre of the other.Used a much more descriptive approach to study relational on asample of players clubs Sabre and the way intentional, whoqualified to the

... Show More
View Publication
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluating the Efficiency of the Entomopathogenic Fungus Beauveria bassiana to Control the Brown Banded Cockroach Supella longipalpa F.
...Show More Authors

      Entomopathogenic fungi can be ideal for the biocontrol of cockroaches since it is environment-friendly microbial pesticide. Susceptibility of second and fourth instar of nymphs and adults of the brown banded cockroach, Supella longipalpa (F.) (Blattodea: Blattellidae) to the entomopathogenic fungi Beauveria bassiana (Bals.) Vuill. at two concentrations 1x 107 and 1x 108 spore/ml was evaluated. Fungus was tested by using two different methods: bait and direct contact. Mortality was monitored after 3, 5 and 7 days’ post exposure. Direct contact of B. bassiana at concentration 1x 107 spore/ml produced mortality on adults 82.76% and for fourth and second instar of nymphs 82.76 and 93.10% after 7 daysâ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Perineural Invasion in Oral Squamous Cell Carcinoma in Relation to Tumor Depth
...Show More Authors

Background: The American Joint committee on Cancer in their 8th edition staging manual regarded perineural invasion as one of the most important prognostic factors for Lip and Oral Cavity Squamous Cell Carcinoma, it also incorporated tumor depth of invasion in defining tumor size category in the new staging system. This study was conducted to evaluate the frequency of perineural invasion in oral squamous cell carcinoma and the effect of approaching tumor depth in this process. Materials and Methods: fifty-four formalin fixed paraffin embedded tissue blocks of radical resections of Oral Squamous Cell Carcinoma were cut and stained with Hematoxylin and Eosin stain, then evaluated for perineural invasion, with estimation of tumor depth of i

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Iraqi-Saudi Relations After 2003
...Show More Authors

Iraqi-Saudi Relations have witnessed a state of rapprochement over decades. However, this rapprochement was temporary and could not overcome the differences that formed the core of Iraqi-Saudi relations after 2003, relations between Iraq and Saudi Arabia deteriorated with the Iraqi governments that followed the rule of Iraq after 2003, especially the government of Nuri Al-Maliki in which relations reached the end of mutual accusations between the two parties. In order to promote the relationship between the two countries, a culture of moderation has to be propagated especially in the field of religion and the religious institution should be encouraged to open up to other sects and to recognize all sects as prelude to combating the cultur

... Show More
View Publication Preview PDF