Preferred Language
Articles
/
jeasiq-569
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help the fraudster to commit and these factors are (the opportunity, motivation, justification, ability) and often scammers with experience in concealing the fraud and the reason for this is weak internal control economic system of the unit, and that the process of detection of financial fraud is done through the availability of indications that.            

The research has come to the most important conclusions:

1-  The process of identifying and evaluating audit is important for the auditor's risk when planning the audit process or when determining what audit procedures for these risks is important and essential role in the process of making mistakes and fraud.

2-  Although the fraudulent can concealing fraud, but he could be detected through the use of a set of techniques that can provide indications about the whereabouts.

The most important recommendations:

1- The need to develop and train Audit stuff and to introduce definition fraud, causes, forms in order to put the investigation of fraud strategy.

2- The researchers recommend examining the causes of financial fraud in the case discovered in its various forms is possible to lead the auditor to determine the features of the person who carried out the fraud.

The researchers recommend using one of the techniques (Data Mining), a Logic Regression for test and Analyes financial ratios for the inherited risk that OBTAINED from banks' financial statements to determine the financial fraud within the existing indicators variables such ratios

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
International Journal Of Computer Applications
Mixed Transforms Generated by Tensor Product and Applied in Data Processing
...Show More Authors

Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.

View Publication
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Characterization Performance of Monocrystalline Silicon Photovoltaic Module Using Experimentally Measured Data
...Show More Authors

Solar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Recent Tools of Software-Defined Networking Traffic Generation and Data Collection
...Show More Authors

أثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأ

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
A Multi-variables Multi -sites Model for Forecasting Hydrological Data Series
...Show More Authors

A multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Biomedical Signal Processing And Control
Decoding transient sEMG data for intent motion recognition in transhumeral amputees
...Show More Authors

View Publication
Scopus (28)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The availability of the internal mechanisms of corporate governance and the Contexts of workof the Federal Board of Supreme Audit of Iraq (BSA (
...Show More Authors

The research focuses on addressing one of the most important concepts of modern management that deal with the relationship between government institutions and stakeholders, Which now occupies a special significance in trends modern management, a concept of corporate governance it takes the internal mechanisms due to its key role and is important in the process of corporate governance and looking for building Effective mechanisms for this concept in light of laws and regulations that are available in the local environment and on the functioning of government institutions, Search has been applied in the Federal Board of Supreme Audit of Iraq (BSA) due to its particular importance as an institution control and as a awaits the societ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref