يعد بيان التدفق النقدي من البيانات المهمة الصادرة من الوحدات الحكومية غير الهادفة للربح، بعد تبنيها معايير IPSASs ، مما يوفر معلومات اوسع تلبي حاجات المستخدمين لأتخاذ القرارات المناسبة . أذ يتضمن بيان التدفق النقدي بموجب المعيار رقم ( 2 ) التدفقات النقدية حسب الأنشطة التشغيلية و الاستثمارية والتمويلية ، وهذا لا ينسجم مع مخرجات النظام المحاسبي الحكومي العراقي . وان هدف البحث هو التعرف على مكونات بيان التدفق النقدي بموجب معايير IPSASs ، وأبراز مفهوم واهمية معايير المحاسبة الدولية للقطاع العام وبذات معيار الدولي رقم
( 2 ) . وأن اهم استنتاج بالبحث هو ان اعداد بيان التدفق النقدي وفق معيار 2 و على أساس الأستحقاق لا يختلف كثيرا عن بيان التدفق النقدي وفق معيار 7 المعد وفقا للمعايير الدولية لأعداد التقارير المالية، مع أخذ بنظر العناية خصوصية القطاع العام ، أذ يتم اعداده بطريقتين المباشرة و غير المباشرة، ويتم تفضيل الطريقة المباشرة وفق المعيار 2 ، وكذلك يتم تقسيم الكشف الى ثلاثة أنشطة وهي الأنشطة التشغيلية والإستثمارية والتمويلية ، أن لبيان التدفق النقدي فوائد عديدة على مستوى الدولة أو الوحدات القطاع العام ومنها معرفة السيولة النقدية ، مما يساعد على أتخاذ القرارات المهمة المتعلقة بالسيولة النقدية ، وهذا غير متوفر في بيان التدفق النقدي الصادر من نظام المحاسبي الحكومي العراقي ، وكما ورد في الدليل المحاسبي العراقي، علما ان كلية الادارة والاقتصاد لاتعد هذا الكشف، وانما فقط ميزان المراجعة الختامي . وأما أهم التوصيات هي العمل على وضع معايير محلية تتوافق مع متطلبات معايير IPSASs أو تبنيها بالكامل، والعمل على تسهيل وضع اجراءات تساعد على فهم وتطبيق معايير المحاسبة الدولية في القطاع العام (IPSASs)، فضلا عن ضرورة الأستفادة من تكنلوجيا المعلومات لتسهيل تبني معايير المحاسبة الدولية في القطاع العام .
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThis study discussed modern variable in the organizational thought that is the high performance organizations in the two of Iraqi public organizations. The aim of study determines to know the level of the performance in this organizations (high or not). The data was Collected by questionnaire which contain (8) characteristics, the organizational design, strategy, process, technology, leadership, the roles, culture, and external environment). The sample contain from (76) employees;
Results points that the two organizations didn’t reach to the high level of performance, and there are significance's difference among them.
Die vorliegende Forschung handelt es um die Satzfelder, besonders das Mittelfeld des Satzes im deutschen und Arabischen. Diese Forschung wurde mit der Satzdefinition, Satzglieder begonnen, damit wir diese klar werden und dann werden die Felder des Satzes gut gekannt. Der erste Abschnitt schlieβt auch den Mittelfeld des Satzes und, wie man das Feld erkennen und bestimmen kann. Die Forschung untersucht auch. Ob es in der arabischen Sprache den selben Struktur wie im Deutschen gibt, z.B Bildung des Satzes sowie Satzfelder bezügllich das Mittelfeld.
Der zweite Abschnitt handelt sich um den arabischen Teil und behandelt die Wortarten im Arabischen sowie den Satz als auch Satzarten (Nominal- Verbal- Halbsatz).
Danach befinden
... Show MoreThe study aimed to reveal the extent of the first intermediate grade science curriculum focus on the national values, health, environmental, economic values, in the light of the education policy in the Kingdom of Saudi Arabia, in addition to present a proposed vision to strengthen it in the science curriculum for the first intermediate grade. The study was applied to the two books student and the two books of activity on the first-second semesters for the academic year 1441 AH. To analyze the curriculum content, the study used a verified card prepared by the researchers and a criterion for interpreting percentages. The study reached the following results: environmental values ranked first with a concentration of (43%), i.e. with an avera
... Show MoreThis research aims to modify the components of stainless steel alloy by the method of surface engineering through the single diffusion coating technique in order to obtain new alloys with high efficiency in resisting harsh environmental conditions. Steam a mixture of sodium chloride ( ) and sodium sulfate ( ) at a temperature of 900 and then compare it with the base alloy. The results showed that the alloys produced in this way are very efficient. The results showed that the aluminum coating showed high efficiency in resisting oxidation and provided better protection for a longer time compared to the uncoated alloy due to the oxide crust layer formed with high adhesion as well as the aluminum-rich phases, whether the phase
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAbstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreThe estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth
... Show Moreالمقدمة
تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.
وعموماً فإن لعملية التسعير م
... Show More