Preferred Language
Articles
/
jeasiq-1448
The importance of measuring and accounting disclosure of intellectual capital To maximize the value of the company
...Show More Authors

Most of the big companies and especially the intillictual ones become a ware of an important fact, and That is, The intillictual capital in new global economy, is a new source for Them & This Valuable source exceed in importance. The other company's sources.

The Traditional disclouser systemes are unable to supply the decisions makers with the Fundimental information require to handel the on going operations which are based on Knowledge and intangible source. But the measuring of this source and the disclose for it in the financial Statements will lead to gain features Statements which will benefit all the parties and lead to make the value of the company great.

And as a result, The accountant occupation must interact, in the shade of the technical development, and the Knowledge economy, measure. The source and disclose it in the financial Statements. As an aime to keep the clients and the users in touch with the latest high quality information which give the real value of the company & for which they need in making their decisions.

The research had reached to a number of infercnces, the most important are:

  • The concept of the intillictual capital is a renewing concept because of the very quick changing environment surrounding as. So it is in the growing and development state and it express' in a special way about the Knowledge affairs "non materialistic"
  • The keeping of the intellectual capital by the comprehencing, the Knowledge stored in the employees minds, by the company administration. And make the old employees transfer them to the new ones or train them about it.
  • The intellectual capital will aid to evaluate the risks and helpe to generate the real value of the company & also it may become the real key for achieving the future flourshing for the company.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 08 2021
Journal Name
Proceedings Of International Conference On Emerging Technologies And Intelligent Systems
Drone Altitude Control Using Proportional Integral Derivative Technique and Recycled Carbon Fiber Structure
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Quasi Semi and Pseudo Semi (p,E)-Convexity in Non-Linear Optimization Programming
...Show More Authors

The class of quasi semi -convex functions and pseudo semi -convex functions are presented in this paper by combining the class of -convex functions with the class of quasi semi -convex functions and pseudo semi -convex functions, respectively. Various non-trivial examples are introduced to illustrate the new functions and show their relationships with -convex functions recently introduced in the literature. Different general properties and characteristics of this class of functions are established. In addition, some optimality properties of generalized non-linear optimization problems are discussed. In this generalized optimization problems, we used, as the objective function, quasi semi -convex (respectively, strictly quasi semi -convex

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
American Journal Of Dermatology And Venereology
Sesame and Pumpkin Seed Oil are New Effective Topical Therapies for Alopecia Areata
...Show More Authors

KE Sharquie, AA Noaimi, MS Abass, American Journal of Dermatology and Venereology, 2019 - Cited by 4

View Publication
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Knowledge, Attitudes and Barriers Towards Breast Cancer Health Education Among Iraqi Community Pharmacists
...Show More Authors

With the increasing prevalence of breast cancer among female internationally, occupies about 25% of all cases of cancer, with a measured 1.57 million up to date cases in 2012. Breast cancer has turn a most warning to health of female in Iraq, where it is the major cause of death among women after cardiovascular diseases, with a mortality rate of 23% related cancer. Recently there is a crucial requirement to include community pharmacists in health elevation activities to support awareness and early diagnosis of cancer, specially breast cancer. The aim of this study is to assess knowledge, attitude and perceived barriers amongst Iraqi community pharmacists towards health promotion of breast cancer. This study is cross sectional research. A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Lithology and minerals identification from well logs for Mishrif Formation in Ratawi oilfield
...Show More Authors

   Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id

... Show More
View Publication
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Mathematical connection skills and their relationship with productive thinking among secondary school students
...Show More Authors

View Publication
Crossref (8)
Crossref