Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It also discusses potentially productive directions for AIS research.
The study aims at showing the effect of basil oil on the sensory properties of the laboratory biscuits. the results show the sensory valuation before and after the storage. the (A4) equation exceeds 15% of T exchange (3 , 4 , 5 g. basil 19 , 55 g . fats )in most of the studied sensuous qualities. Then, the (A5) equation of 20% exchange percentage (4.60g. basil oil + 18.40g. fats). Then, the (A3) equation of 10% exchange percentage (2.30g. basil oil + 20.70g. fats). Then the (A2) equation of 5% exchange percentage (1.5g. basil oil + 21.85g. fats). Finally, the control equation (A1) received the lower value of sensuous evaluation and general acceptance. Abstract differences also appeared at denotation level 0.05 between the (A2)
... Show MoreThe current investigation conducted to examine the anatomical aspects of the Arum colocasia L. cultured in Iraq. The study included the anatomical characteristics of the different plant parts, including the root, stem and leaf, the results of the study on the vegetative parts were shown the important anatomical characteristics in terms of the form of the sections reviewed and vertical in them, and the study of their tissues, as well as the stomata complexities and the thickness of the epidermis, vascular bundles, pith, additionally the dimensions of mesophyll and in blade of the leaf. The research was conducted as it is one of the monocotyledon plants and because of the lack of anatomical studies on it, therefore it was studied to know the
... Show MorePriority of road maintenance can be viewed as a process influenced by decision-makers with varying decision-making power. Each decision-maker may have their view and judgment depending on their function and responsibilities. Therefore, determining the priority of road maintenance can be thought of as a process of MCDM. Regarding the priority of road maintenance, this is a difficult MCDM problem involving uncertainty, qualitative criteria, and possible causal relationships between choice criteria. This paper aims to examine the applicability of multiple MCDM techniques, which are used for assessing the priority of road maintenance, by adapting them to this sector. Priority of road maintenance problems subject to internal
... Show MoreFaujasite type NaY zeolite catalyst was prepared from locally available kaolin, then the prepared NaY zeolite have been modified by exchanging of sodium ion with ammonium to produce NH4Y zeolite. NH4Y zeolite was converted to HY zeolite by ion exchanging with oxalic acid. Zinc and nickel promoters have been added to the prepared HY zeolite catalyst, and the effect of these promoters on the catalytic activity of the prepared HY catalyst was studied in fluid catalytic cracking process using light gas oil as a feedstock. The experimental results show that the promoted catalyst gives higher gas oil conversion and gasoline yield than HY zeolite catalyst at the same reaction temperature and WHSV. It was also found that the promoted catalyst gi
... Show MoreCrude oil is one of the most important sources of energy in the world. To extract its multiple components, we need oil refineries. Refineries consist of multiple parts, including heat exchangers, furnaces, and others. It is known that one of the initial operations in the refineries is the process of gradually raising the temperature of crude oil to 370 degrees centigrade or higher. Hence, in this investigation the focus is on the furnaces and the corrosion in their tubes. The investigation was accomplished by reading the thickness of the tubes for the period from 2008 to 2020 with a test in every two year, had passed from their introduction into the work. Where the thickness of more than one point was measured on each tube in the sa
... Show MoreThe performance of photovoltaic (PV) panel having staggered metal foam fins was examined experimentally in Baghdad, Iraq. Three staggered metal foam fin configurations attached to the backside of the PV panel were studied. The measured parameters were front and back surfaces temperature, open voltage and current circuits, maximum power, and PV efficiency. It was noted that the maximum electrical efficiency enhancement was 4.7% for staggered metal foam fins (case III) than the reference PV panel. The operating temperature of the cell was increased when the value of solar intensity was high. Thereby, the electrical efficiency was decreased. It was found that the metal foam fins decreased the PV temperature by 2-3 o
... Show MoreAcute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More