Preferred Language
Articles
/
jeasiq-1280
دور مكننة المعلومات المحاسبي في اتخاذ القرارات
...Show More Authors

دور مكننة المعلومات المحاسبي في اتخاذ القرارات

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 18 2022
Journal Name
Midad Al-adab Refereed Quarterly Journal
عقبات الفهم في الكتابة الاخبارية دراسة مسحية في اخبار وتقارير جريدة الزمان
...Show More Authors

عرفت لغة الصحافة بأنها الجامعة لصحة الفصحى وسلامتها ووضوح العامية وبساطتها ؟ وتشكل عقبات الفهم في الكتابة الاخبارية محور البحث الى سوء الفهم لدى المتلقي حيث وضع الباحث تساؤلا رئيساً يغطي على كل الجوانب مشكلة البحث وسيتلزم الاجابة عنه. ماعقبات الفهم في الكتابة الاخبارية الاستنتاجات التي توصل إليها الباحث: 1. ركزت الصحيفة على المصطلحات السياسية بااعتبارها صحفية سياسية يوميه 2. استخدمت الصحيفة المصطلحات الت

... Show More
View Publication
Publication Date
Sat Mar 31 2018
Journal Name
College Of Islamic Sciences
الخبر والانشاء في كتابِ التمهيدِ في علومِ القرآن لمحمد هادي معرفة (ت1427هـ)
...Show More Authors

ملخـــص البحــــث

 

   لا شك أن البلاغة تمثل الركن الأساس في إعجاز القرآن الكريم وبها تسمى معجزة (الإذعان) إذ عجز أفصح العرب عن معارضته أو حتى مجاراته أو حتى كتابة سورة من سوره الرصينة والبليغة المعجزة , لذلك شغل العلماء : (مفسرون , بلاغيون , نحويون , ...)  بهذا العلم , فأخذ كل منهم يدرسه بطريقة مختلفة ومنهاج مغاير ليزيد من هذا البحر المديد, ولأجل الكشف عن المزيد من لآلئ القرآن الكامنة وال

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Factors that Effect on the Level of Accounting Conservatism A sample study Of insurance companies which listed on the Amman Stock Exchange (2005-2016)
...Show More Authors

This study aimed to measure  the accounting conservatism  and the lemited factors which  affected on it in the annual financial reports of insurance companies which listed on the Amman Stock Exchange during the period from 2005 to 2016, these factors were represented by firm age, firm debt and firm size.

Using the market value model (MV) To book value  ( BV) Beaver and Ryan (2000) The level of the accounting conservatism was measured. The study found that the insurance companies which are listed on the ASE exercise the accounting conservatism when they were  preparing financial reports. And when conducting a process  of the test of the affected of the factors (The age of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Effect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject
...Show More Authors

Effect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject MIAAD NATHIM RASHEED LECTURER Abstract The recent research goal is to know the influence of computer use to earn and fulfillment information for students of first class in biology material and to achieve that put many of the zeroing hypothesis by researcher as follow: There were no differences between statistical signs at level (0,05) between the average students' marks who they were study by using computer and between the average student ' marks who they were study in classical method of earning and fulfillment. The researcher chose the intentional of the medical technical institute that included of two branches the first class (A

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 28 2023
Journal Name
Journal Of Planner And Development
Using GIS to identify hazardous earthquake locations in Iran
...Show More Authors

The objective of all planning research is to plan for human comfort and safety, and one of the most significant natural dangers to which humans are exposed is earthquake risk; therefore, earthquake risks must be anticipated, and with the advancement of global technology, it is possible to obtain information on earthquake hazards. GIS has been utilized extensively in the field of environmental assessment research due to its high potential, and GIS is a crucial application in seismic risk assessment. This paper examines the methodologies used in recent GIS-based seismic risk studies, their primary environmental impacts on urban areas, and the complexity of the relationship between the applied methodological approaches and the resulting env

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Accounting And Financial Sciences Journal
The Extent to which the Quality of Accounting Information Systems Contributes to Reducing Material
...Show More Authors

This research dealt with shedding light on the nature of material misrepresentations, in addition to knowing the extent to which the quality of accounting information systems contributes to reducing material misrepresentations On the theoretical side, a number of sources were relied upon in dealing with the research problem and presentation of the topic, while in the practical side, it was relied on the questionnaire form, where the research sample was (accountants and auditors), where 50 forms were distributed and 50 were received, and the data was analyzed and hypotheses tested through the program Statistical spss to show the relationship between the variables. The research reached a number of conclusions, the most important of which is t

... Show More
View Publication
Publication Date
Fri Mar 01 2024
Journal Name
مجلة الاداب الجامعة المستنصرية
منصة زوم ودورها في تقديم خدمات المعلومات في ضل جائحة كورونا
...Show More Authors

Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Contemporary Challenges for Cloud Computing Data Governance in Information Centers: An analytical study
...Show More Authors

Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 04 2004
Journal Name
Al-academy
الآت الاطفال الموسيقية الشعبية والتقليدية في التربية
...Show More Authors

الآت الاطفال الموسيقية الشعبية والتقليدية في التربية

View Publication Preview PDF