Preferred Language
Articles
/
jeasiq-2165
A proposed model for disclosing the role of the collective intelligence system in improving joint auditing
...Show More Authors

This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”   

The proposed model is designed for the disclosure of joint auditing and the role of collective intelligence in improving it to achieve integration between the auditor’s report on the one hand and the joint audit information on the other hand, by disclosing the joint audit information in the explanations complementing the audit report that should be available in the current audit file of the economic unit in question. Auditing, by merging the questions of the collective intelligence system (who, what, how, why) with the indicators of the quality of the audit, and the research reached a set of conclusions, the most important of which is unified documentation of the joint audit work in the audit office as it is permissible to use the collective intelligence system—documenting the work carried out by members of his team independently of the other office. As for the most important recommendations, they were represented in need to adopt the proposed model for using collective intelligence to improve the quality of joint auditing performance, which aims to provide a mechanism for disclosure and documentation of joint auditing

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
The Asian Efl Journal
The EFL Students' Academic Buoyancy in Reading and Listening Skills
...Show More Authors

This research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Sep 30 2023
Journal Name
Lark
ADJECTIVES WITH THE SUFFIX -OVATE - / - EVAT IN MODREN RUSSIAN LANGUAGE
...Show More Authors

يكشف هذا المقال عن مشكلة الصفات ذات المكون الكمي والتي تعتبر واحدة من اقوى الموارد المكونة للكلمات التعبيرية والتقويمية و يتم تحليل التركيبات الدلالية ذات الاوجه المتعددة التي تنشا من عملية توظيف الصفات المشتقة بمساعدة اللواحق والتي تدل على الاتجاه العام للغات السلافية وذلك لتطوير الدلالات العاطفية والتقييمية في الكلمات ذات معنى الميزة او الخاصية يتم تقديم تعريف انماط تكوين المعاني الضمنية في دلالات

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 15 2019
Journal Name
Arab World English Journal For Translation And Literary Studies
The Unavoidable Suffering in Selected Literary Texts: Poems and Novels
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 19 2022
Journal Name
International Journal Of Inventions In Engineering & Science Technology
Biodiversity in the Northern Region using GIS and Remote Sensing
...Show More Authors

Biodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .

Publication Date
Thu Jul 01 1999
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
Species the soft tck genus Argas (Acarina ,Ixodoidea) in Iraq
...Show More Authors

A total 474 argasid ticks removed from 617 hosts including bats, rodents, and birds were found belong to four species of the genus Argos. One of which A. reflexus is reported for the first time for Iraq. Some informations regarding the infestation rate, intensity and some biological data are provided.

View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Assessing Asphalt and Concrete Pavement Surface Texture in the Field
...Show More Authors

The incorporation of safety characteristics into the traditional pavement structural design or in the functional evaluation of pavement condition has not been established yet. The design has focused on the structural capacity of the roadway so that the pavement can withstand specific level of repetitive loading over the design life. On the other hand, the surface texture condition was neither included in the AASHTO design procedure nor in the present serviceability index measurements.

The pavement surface course should provide adequate levels of friction and ride quality and maintain low levels of noise and roughness. Many transportation departments perform routine skid resistant testing, the type of equipment us

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Postoperative Wound Infections and the Antimicrobial Susceptibility in Baghdad Hospitals
...Show More Authors

Nosocomial infections are one of the most important causes of mortality and morbidity in hospitals. These are major public health problems worldwide, but particularly in developing countries. The purpose of this research was to analyze the frequency of the microorganisms in the specimens taken from the surgical wounds, and to examine antimicrobial susceptibility for some isolates . Wound swabs were examined from June 2010 to January 2011. The isolates were identified by conventional methods, antimicrobial susceptibility testing was performed by Kirby-Bauer disc diffusion method as per NCCLS guidelines.A total of 102 wound swabs were examined 22(21.56%) swabs were sterile and 80(78.43%) were positive for microorganisms. The results showed

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
A Comparison between Er,Cr:YSGG 2780 nm Laser and Carbide Fissure Bur in Root-End resection
...Show More Authors

Aim: The Aim of the study is to compare between Er,Cr:YSGG 2780 nm laser and carbide fissure bur in root-end resection regarding the morphological variations, temperature changes and the duration of resection process.

Settings and Design: 5 W, 25 Hz, 50% water, 80% air,25.47 J/cm2 .

Material and method: twenty-one extracted single rooted teeth endodontically were treated, twenty teeth were obturated and divided into two groups according to method of resection. Group 1 root-end resected using cross cut carbide bur while group 2 root-end resected using laser with MGG6 sapphire tip of 600 μm diameter. Temperature on external root surface and duration of resection were recor

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Meta Gene
Association analysis of FTO gene polymorphisms rs9939609 and obesity risk among the adults: A systematic review and meta-analysis” Meta Gene (2020) 7–7/100832
...Show More Authors

Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgro

... Show More
View Publication