The research aims to highlight on the behavioural approach in accounting, and clarify the behavioural implications of the main activities of accounting, and clarify the concept of information inductance within the framework of the behavioural approach and its impact on preparing financial statements. And that the impact of financial information on the behaviour of investment decision-makers, and to achieve the goals of the research, the researcher prepared a questionnaire according to Likert five-step scale, and he took into consideration in preparing it in line with the characteristics of the study community, and that the target community for this questionnaire is the investors in the Iraq Stock Exchange. The researcher reached a set of conclusions and recommendations, and the most important conclusions are the following: There is a significant effect of the behavioural implications of information on the selection of accounting methods, and There is a significant effect of the accounting methods on the investors ’decisions with the presence of the behavioural implications of the information, and If the accountant anticipates the results of using the information, he may lead it and before communicating any information, and therefore even before any results appear, he chooses to change the information, his behaviour or even his goals, and It is possible to predict the behaviour of individuals and guide this behaviour in an appropriate way by providing the appropriate information in the decision-making process, and By being aware of the users ’reactions to the accounting methods, the accountant can use the preferred alternative accounting methods for them. Either the most important recommendations are: The need to take account of the preparers of accounting information behavioural aspects, and take the reaction of users to accounting information in consideration when performing accounting work, and choose accounting methods, and The need to pay attention to the information provided to investors, which helps them in making investment decisions, and to provide this information periodically and systematically and provide it with the speed and accuracy possible, and work to provide the appropriate information in terms of quantity, type and time in order to facilitate proper investment decision-making
Abstract
This research aims to identify the effect of measuring reinforcement (regular - irregular) in gamification upon developing computer skills among secondary education students in the Kingdom of Saudi Arabia. The research experiment was applied on two samples of (68) secondary education students in the Kingdom of Saudi Arabia in the Aurar region. The results revealed there is a significant difference between the experimental group that used (irregular) reinforcement and the control group used (regular) reinforcement in gamification through the post-application of the electronic programming test and through the programming, language skills observing card (Visual Basic Studio).
In this work, a Photonic Crystal Fiber (PCF) sensor based on the Surface Plasmon Resonance (SPR) technology was proposed. A thin layer of gold (Au) was deposited on a D-shaped Photonic Crystal Fiber (PCF), which was coated with plasmonic chemically stable gold material with a thickness of 40nm. The performance parameters like sensitivity including wavelength sensitivity and amplitude sensitivity and resolution were evaluated by simulation using COMSOL software. The proposed sensor was created by using the finite element approach, it is numerically examined. The results show that the surface of D-shaped Photonic Crystal Fiber coated with Au behaves as a sensor to detect the refractive index (IR) of toxic metal ions. The impacts of the str
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show More