The research aims to identify the extent to which Iraqi private banks practice profit management motivated by reducing the taxable base by increasing the provision for loan losses by relying on the LLP it model, which consists of a main independent variable (net profit before tax) and independent sub-variables (bank size, total debts to total equity, loans granted to total obligations) under the name of the variables governing the banking business. (Colmgrove-Smirnov) was used to test the normal distribution of data for all banks during the period 2017-2020, and then find the correlation between the main independent variable sub and the dependent variable by means of the correlation coefficient person, and then using the multiple regression model to find the effect between the research variables according to the equation of the LLP it model for a sample of three banks (the Commercial Bank of Iraq, the Bank of Baghdad, the Ashur International Bank) based on a time series extending from (2017-2020). The researchers reached the most important conclusions :The possibility of using the LLP it model on Iraqi banks to reveal the practice of profit management and there is a significant correlation between the net profit before tax and the provision for loan losses. The researchers recommended the most important recommendations: Conducting continuous tests to detect banks that practice earnings management for the purpose of reducing the tax base, the necessity of using modern tools and methods (LLP it) by the tax administration to limit the practice of profit management in order to reduce the tax base
The topic of the working of the secondary event structure in the embodiment of the film unity is related to the ability to produce a film of controlled events that strengthen each other. The researchers divided the subject topic into an introduction and two sections, as follows: The first section is the event and the action in drama construction wherein the relationship of the dramatic act with the events in general and the secondary event in particular were studied as it has a relationship in a synergistic building of the film unity.
The second section was the patterns of the secondary event in the film wherein the researchers dealt with the patterns, types and functions
... Show MoreRESUMEN
Una joven cuenta cómo, en plena noche, aprovechando la tranquilidad de esa hora, sale a escondidas de su casa y va a reunirse con su enamorado. Envuelta en la oscuridad, se deja dirigir por la luz de su propio amor hasta el lugar de la cita, donde la pasión de los amantes culmina. A continuación, relajados por la brisa nocturna, los amantes se adormecen, primero, el amado velado por la amada, por último, ella misma.
Amor entre dos enamorados. Unión mística de alma y Dios , aunque , de hecho , podría servirnos de clara exposición temática el subtitulo con que el poema suele publicarse en la tradición , tanto manuscrita como impresa : Canciones del alma que se goza d
... Show MorePraise be to the one who taught the pen. Without the pen, the knowledge of the first two would not have reached the others. Then, praise the one who taught man from the printing industry unless he knew, and prayers and peace be upon those who guide all nations to the invention and the follower in the matter of religion, and to his family and companions.
The use of Qur’anic use is an integrated and important topic that examines the building and the meaning, which are two major titles in the study of Arabic, so the goal of scholars when going into these explanations was to find out the wonderful linguistic miracle of this great book.
Scholars have worked hard to talk
In this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.
Highway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu
... Show MoreIn the last decades of the twentieth century, ideas emerged that were increasingly being floated, stating that the planet is suffering from a population explosion, depletion of resources, and environmental problems that require action to be addressed. Although these problems in practice need scientific solutions, the problem is that these solutions collide with ideologies. Here the green political thought emerges, based on the criticism of many ideological axioms. The owners of green thinking agree that most environmental damage is due to the humanist doctrine. It criticizes modernity accompanied by a scientific revolution, where this criticism centered around (the rationality of the scientific and technological mind), here the green pol
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreBackground: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randoml
... Show MoreA (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.