Preferred Language
Articles
/
jeasiq-1257
Analysis of the theoretical framework of the REA accounting model Used in the design of accounting information systems
...Show More Authors

Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It also discusses potentially productive directions for AIS research.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Importance of Strategic Orientation Dimensions in the Iraqi National Security Service: An Analytical Study
...Show More Authors

The current research aims to identify the level of strategic orientation and its dimensions (vision, mission, goals, and values) in the Iraqi National Security Service (INSS). The researchers followed the descriptive analytical approach as one of the forms of analysis and organized scientific interpretation to describe a specific phenomenon or problem, adopting the form questionnaire being the main source in collecting data and preparing for this. Based on the program of the Statistical Package of Social Sciences (SPSS 26) to analyze the data and come up with the final research results to identify the opinions of the intended sample on the subject of research, and the questionnaire of (20) paragraphs included the search variable, and was

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
ا Hadiths prohibiting the intimidation of a Muslim in the six books - an analytical study
...Show More Authors

This research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analyt

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Effect of Public Debt on The Trade Balance in Iraq For The Period (2003-2021)
...Show More Authors

Despite the significant increase in public spending in Iraq, it was not directed toward the important sectors that have an important role in correcting the productive structure. Rather, most of the public expenditure was going to cover the required imports, or to face shocks, whether security or health, and this caused a continuous decrease in the volume of Iraq's exports of goods and services, as the aim of the study was to review the importance of public debt and its impact on the trade balance, as well as to know the economic policies that can contribute to strengthening the trade balance, as the study proved through the (ARDL) model that there is a direct relationship between the domestic debt and the net trade balance, and an invers

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Towards measuring the aggregate index of banking stability in Iraq for the period 2010 -2016
...Show More Authors

Abstract:

    The paper aims to measure an aggregated banking stability index reflecting the degree of stability of the banking system to help policy makers to take the necessary actions to avoid financial crises facing banks and to achieve a banking system with high efficiency in terms of banking risk.

    Therefore, the problem of paper is that the Central Bank of Iraq did not seek until 2016 to build a aggregated index for the purpose of identifying the stability of the banking situation in Iraq, but rather on the adoption of scattered indicators, which depend on the mechanism of relative changes in those indicators for the purpose of identifying the situation of b

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Iraqi Journal Of Science
Magnetohydrodynyamic Flow for a Viscoclastic Fluid with the Generalized Oldroyd-B Model with Fractional Derivative
...Show More Authors

This paper deals with the Magnetohydrodynyamic (Mill)) flow for a viscoclastic fluid of the generalized Oldroyd-B model. The fractional calculus approach is used to establish the constitutive relationship of the non-Newtonian fluid model. Exact analytic solutions for the velocity and shear stress fields in terms of the Fox H-function are obtained by using discrete Laplace transform. The effect of different parameter that controlled the motion and shear stress equations are studied through plotting using the MATHEMATICA-8 software.

View Publication Preview PDF
Publication Date
Wed Jul 09 2025
Journal Name
Resources
Enhancing Reservoir Modeling via the Black Oil Model for Horizontal Wells: South Rumaila Oilfield, Iraq
...Show More Authors

Horizontal wells have revolutionized hydrocarbon production by enhancing recovery efficiency and reducing environmental impact. This paper presents an enhanced Black Oil Model simulator, written in Visual Basic, for three-dimensional two-phase (oil and water) flow through porous media. Unlike most existing tools, this simulator is customized for horizontal well modeling and calibrated using extensive historical data from the South Rumaila Oilfield, Iraq. The simulator first achieves a strong match with historical pressure data (1954–2004) using vertical wells, with an average deviation of less than 5% from observed pressures, and is then applied to forecast the performance of hypothetical horizontal wells (2008–2011). The result

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Chalcogenide Letters
Preparation and analysis of Ag2Se1-xTe x thin film structure on the physical properties at various temperatures by thermal evaporation
...Show More Authors

Silver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm

... Show More
Publication Date
Wed May 03 2023
Journal Name
Chalcogenide Letters
Preparation and analysis of Ag2Se1-xTe x thin film structure on the physical properties at various temperatures by thermal evaporation
...Show More Authors

Silver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm

... Show More
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF