Preferred Language
Articles
/
jeasiq-1189
تحليل حسابات الاعتمادات المستندية دراسة نظرية – تطبيقية في مصرف الرشيد – بغداد للفترة من 2004 – 2006 المالية
...Show More Authors

تلعب الاعتمادات المستندية دوراً كبيراً وخطيراً في التجارة الدولية باعتبارها إحدى أوسع أدوات الدفع انتشاراً في العالم سواءاً كان ذلك بالنسبة للمستورد أم للمصدر وتغطيتها للمخاطر المحتملة لكلا الطرفين، فهي تؤمن للمصدر استلام قيمة البضاعة بالكامل عند تنفيذها لشروط العقد، ويسمح للمستورد بعدم الدفع إلا بعد إتمام شحن البضاعة وتقديم المستندات المطلوبة واستلامها.

وتقوم المصارف التجارية المحلية، والعربية، والدولية بإصدار تعليمات لغرض ضبط هذه العملية أصوليا فضلا عن غرفة التجارة الدولية بباريس والتي تصدر نشرات متتابعة بين آونة وأخرى تضع فيها أساسا مشتركاً تحكم كافة الأطراف المتعاملة بالاعتمادات المستندية، وذلك منذ الحرب العالمية الأولى، وأصبحت تلك الأسس تعرف ألان (( بالأصول والأعراف الدولية الموحدة للاعتمادات المستندية )) (حسين، 1988: 97).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Difficulties and Problems in Teaching and Learning Spanish in Particular and Foreign Languages: Las Dificultades en la Enseñanzayel Aprendizaje de Español como Lengua Extranjera (ELE)en Particular ylas Lenguas Extranjeras en General: El Docente no Nativo
...Show More Authors

       This paper aims at providing the teaching staff members with the necessary skills so as to become capable of tackling various situations, and treating daily problems that face students learning Spanish as a Second Language.  This is made as an attempt to make teachers of foreign languages in general acquainted with modern trends of teaching with less complicated methods, specifically in teaching e earlier stages of foreign languages.

Abstracto:

      En el presente trabajo pretendemos dotar al docente no nativo de Lenguas extranjeras, con algunos de los métodos necesari

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Asymmetry of accounting information - the reasons and proposed treatments
...Show More Authors

The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So,  the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire   in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs ​​in the laws and regula

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Compare Linear Progamming With Other Methods to Finding Optimal Solution for Transportation Problem
...Show More Authors

The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Strategy formulation for Missan Oil Company for the years 2020-2024
...Show More Authors

     The research problem revolves around the failure of Maysan Oil Company to have a strategy that enables it to keep up with work in a mysterious and highly dynamic environment. Therefore, the research aims to present a proposed strategy that is comprehensive and realistic to the Maysan Oil Company for the next five years (2020-2024) based on the position and conditions of the company Current and future by adopting the scientific foundations for formulating the strategy, and the importance of research lies in the company's situational analysis to know its internal capabilities from strengths or weaknesses and diagnosing the surrounding elements of opportunities or threats so that this analysis represents a s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
A comparative reading of the social and political satire in the works of Abu al-Fadl Zrui Nasrabad and Ahmad Rajab (The tadhk: خوانش تطبیقی طنز اجتماعی – سیاسی در آثار ابوالفضل زرویی نصرآباد و احمد رجب(مورد مطالعه: تذکرة المقامات زرویی و نصف كلمة احمد رجب)
...Show More Authors

           Satire is genre of the literary arts that has always been the source of human interest. Because  it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
(Generalized Anxiety Disorder among Students of Baisc Education in Unv of Sulamina)
...Show More Authors

The current research aims to measure Generalized Anxiety Disorder among students of the University of Sulaymaniyah / College of Basic Education, and to identify the significance of differences between sex, scientific specialization and age, and for that reason, the research sample of (102) male and female students was chosen in a random manner, and the researcher used the diagnostic criteria for the generalized anxiety disorder contained He mentioned it in the Statistical and Diagnostic Manual of Psychiatry, and the paragraphs of the scale were formulated according to those standards after they verify the conditions of honesty and consistency, and the use of appropriate statistical means. The results of the research indicated that genera

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref