Preferred Language
Articles
/
jeasiq-1961
The importance of using analytical procedures in the detection of creative accounting practices
...Show More Authors

The research aims to identify the importance of using analytical procedures in the detection of creative accounting practices. To achieve this goal, (100) questionnaires were prepared and distributed to the auditors in the Federal Financial Supervision Bureau and the authorized auditors' offices and practitioners of the auditing profession in Iraq. For the purpose of testing the research hypothesis and analyzing data, some appropriate statistical methods have been used and the use of the statistical program (SPSS) to analyze the data. The results of the research showed that the analytical procedures and tests applied by the auditor have a role in revealing and limiting creative accounting practices and methods and that auditors use Analytical procedures at all stages of the audit. The most important recommendations reached are the need for auditors to pay attention to the implementation of the auditing process with all elements and components of the financial statements and to use analytical procedures to identify all possible creative accounting practices and methods applied. The need for the Federal Financial Supervision Bureau and the Association of Certified Public Accountants in Iraq to organize training courses for auditors the importance of using analytical procedures in auditing, and to follow developments in international accounting and auditing standards, creative accounting practices, and ways to limit their effects.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Journal Of Economics And Administrative Sciences (jeas)
Using Statistical Methods to Increase the Contrast Level in Digital Images
...Show More Authors

This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effect of the think, pair, and share strategy of using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women
...Show More Authors

The research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The hydrological regime of the Tigris River in the city of Baghdad
...Show More Authors

Water drainage pattern in the rivers and changed the nature of the renewed feeding areas
in the basin in terms of topographic and geological conditions and climate in addition to the
human role in organizing the process flow within these basins. This study addressed the
development of the Tigris River Hydrological in the city of Baghdad and found that the
annual rate of water drainage in the Tigris River was driven down very significantly,
especially in the past twenty years, and since 1996 up to 2014 record flow rates of less than
the overall rate of discharge of water, a (950 m3 / s ), in addition to the quarterly decrease the
discharge rates, especially since the beginning of the year 2000 and took converge all fo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role of the League of Arab States in the Syrian crisis
...Show More Authors

Abstract The League of Arab States took many procedures against the Syrian political system, like suspended Syria's membership in the League of Arab States and sent a team of Arab observers headed by Dabi to discuss the situation there and issued some decisions and statements that called the Syrian regime to stop the use of violence and repression against the Syrian opposition.Through these steps, the Arab League has tried to help the Syrian parties to resolve the crisis. However, the role of the league in the Syrian crisis was characterized by weakness in general, and lack of seriousness, which contributed in the aggravation of the situation in Syria, and the intervention of major powers in the internal affairs of Syria.

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Care of the Holy Quran In the era of the Noble Prophet
...Show More Authors

This is a brief research in which I tried to briefly explain the care that the Holy Qur’an received during the era of the Prophet, may God bless him and grant him peace, from the Prophet, may God bless him and grant him peace, and all of his honorable companions, may God bless him and grant him peace. I made this research in an introduction and two chapters, the first chapter I made it entitled: About the Holy Qur’an, in which I talked about general investigations about the Holy Qur’an, such as the definition of the Holy Qur’an and the difference between it and the hadith Qudsi and the hadith of the Prophet, then I mentioned a part of the virtues of the Holy Qur’an in general and the virtues of some surahs in particular, and th

... Show More
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Bionatura
Detection of lukf-pv gene in Staphylococcus aureus isolated from pregnant women with Urinary tract infection
...Show More Authors

Scopus Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Malaysian Journal Of Medicine And Health Sciences
Detection of Extended Spectrum β-lactamases and Metallo β-lactamases in Pseudomonas Aeruginosa isolated from Burns
...Show More Authors

P. aeruginosa is one of the complex targets for antimicrobial chemotherapy. Also, it is intrinsically resistant to several antibiotics. It produces β-lactamases enzymes that are responsible for the widespread β-lactam antimicrobial resistance. There are three major groups of β-lactamase enzymes, MBLs and ESBLs forming Pseudomonas is a major issue for the treatment of burns victims. Methods: A total of 28 clinical isolates related to P. aeruginosa have been obtained from the burns specimens from patients attending to AL-Imam hospital/Baghdad-Iraq, through the period from October 2015 to March 2016. Also, all isolates have been recognized as P. aeruginosa via utilizing bacteriological assay and confirmed by Vitek 2. In addition, the suscep

... Show More