Preferred Language
Articles
/
jeasiq-1378
الاتجاهات الاقتصادية المعاصرة للعولمة وتأثيرها على المحاسبة
...Show More Authors

ان التحول في الحياة الاقتصادية الناتج عن التقدم التكنولوجي وتقنية المعلومات في مجالات الفضاء والتقدم في الاتصالات السلكية واللاسلكية والالكترونيات الدقيقة مكنت الشركات من ارسال كميات هائلة من البيانات بتكاليف منخفضة.

وان انتشار الشركات متعددة الجنسبة والتي سعت لتحقيق السيطرة على اقتصاديات العالم من خلال فروعها المنتشرة فتحتاج الى نظم للانتاج والتكاليف ونظم للمعلومات الادارية والمحاسبية وتحتاج الى نظام محاسبي كفوء وتعد حساباتها وفق معايير محاسبية موحدة دولياً للسيطرة على فروعها والمحاسبة على الاستثمار والتعرف على حصص الارباح والمحاسبة عن الضرائب ...الخ كل ذلك أدى الى عولمة المحاسبة.       

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 11 2021
Journal Name
Journal Of Planner And Development
The impact of recycling abandoned sites on sustainable development
...Show More Authors

In today's cities, it is easy to see large numbers of vacant lands and unused abandoned sites in downtown areas that are not only ugly but also potentially becoming fertile ground for criminal activities that endanger residents and visitors and contribute to the further degradation of neighborhoods,

can provide reuse of spaces Neglected opportunities to reshape the appearance of the city and to improve the city center for its users that the presence of many neglected sites, whether they were abandoned buildings or sites for destroyed buildings in Mosul after the war on ISIS and with large areas amid the urban fabric led to the emergence of the research problem is (lack of urban planning to reactivate abandoned sites within the ci

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 19 2004
Journal Name
Association Of Arab Universities Journal Of Engineering
تأثير وجود المحرمات على تنامي الفشل في المنحدرات
...Show More Authors

Publication Date
Tue Mar 15 2022
Journal Name
Arab Science Heritage Journal
قراءة في المصدر واسم المصدر على وفق الاستعمال
...Show More Authors

What linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law and its connection with the Arabic dialects, which proceeded in the linguistic levels to form Phenomenon inherent in the use of the source and the name of the source

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A reflection of increased financing Equity on returns commons stocks
...Show More Authors

The research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.

This research has included some of the theoretical concepts to each of the Equity

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Influence of Cold Atmospheric Plasma on Acinetobacter baumannii
...Show More Authors
  1. baumannii is an aerobic gram negative coccobacilli, it is considered multidrug resistance pathogen (MDR) and causes several infections that are difficult to treat. This study is aims to employ physical methods in sterilization and inactivation of A. baumannii, as an alternative way to reduce the using of drugs and antibiotics.
  2.             Cold Atmospheric Plasma was generated by one electrode at 20KV, 4 power supply and distance between electrode and sample was fixed on 1mm. A. baumannii (ATCC 19704 and HHR1) were exposed to  Dielectric Barrier Discharge type of Cold Atmospheric Plasma (DBD-CAP) for several periods

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2010
Journal Name
Political Sciences Journal
اضاءات على الانتخابات الشريعية في العراق عام 2010
...Show More Authors

اضاءات على الانتخابات الشريعية في العراق عام 2010

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
International and Regional Competition for the African Coast
...Show More Authors

This study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF