Preferred Language
Articles
/
jeasiq-569
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help the fraudster to commit and these factors are (the opportunity, motivation, justification, ability) and often scammers with experience in concealing the fraud and the reason for this is weak internal control economic system of the unit, and that the process of detection of financial fraud is done through the availability of indications that.            

The research has come to the most important conclusions:

1-  The process of identifying and evaluating audit is important for the auditor's risk when planning the audit process or when determining what audit procedures for these risks is important and essential role in the process of making mistakes and fraud.

2-  Although the fraudulent can concealing fraud, but he could be detected through the use of a set of techniques that can provide indications about the whereabouts.

The most important recommendations:

1- The need to develop and train Audit stuff and to introduce definition fraud, causes, forms in order to put the investigation of fraud strategy.

2- The researchers recommend examining the causes of financial fraud in the case discovered in its various forms is possible to lead the auditor to determine the features of the person who carried out the fraud.

The researchers recommend using one of the techniques (Data Mining), a Logic Regression for test and Analyes financial ratios for the inherited risk that OBTAINED from banks' financial statements to determine the financial fraud within the existing indicators variables such ratios

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating The Performance of Public Companies in The Light of Financial Indicators Case study of the General Company for Drugs and Medical Supplies/ Samarra – Iraq For the period (2014-2019)
...Show More Authors

 

The research aimed to evaluate the financial performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq to know the strengths and weaknesses that affect its performance, as well as to compare its performance in the years between (2017-2019), which are characterized by security stability with its performance in previous years (2014 -2016) which is characterized by security instability, to assess the extent of its ability to achieve growth in performance, by answering the main question, what is the evaluation of the performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq in the light of financial indicators?

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Medical Journal Of Babylon
Diagnostic value of neutrophil lymphocyte ratio in detection of acute appendicitis
...Show More Authors

The diagnosis of acute appendicitis (AA) sometimes is illusive and the accompanying clinical and laboratory manifestations cannot be used for definitive diagnosis. Objective: This study aimed to evaluate the diagnostic value of neutrophil/lymphocyte ratio (NLR) in detection of AA. Materials and Methods: This is a cross-sectional study that included a total of 80 adult patients with AA and 62 age- and gender-matched patients with abdominal pain due to causes other than AA. Three milliliter of peripheral blood were collected from each participant. The NLR was calculated by dividing the absolute neutrophil count by the absolute lymphocyte count. Receiver operating characteristic curve was used to assess the diagnostic value of NLR in detection

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 24 2015
Journal Name
Chinese Journal Of Biomedical Engineering
Single Channel Fetal ECG Detection Using LMS and RLS Adaptive Filters
...Show More Authors

ECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.

Publication Date
Tue Mar 01 2022
Journal Name
Malaysian Journal Of Medicine & Health Sciences
Detection of Iron and Ferritin in Diabetes Mellitus Type 2 Patients
...Show More Authors

Scopus (2)
Scopus
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
GIS as A Tool for Expansive Soil Detection at Sulaymaniyah City
...Show More Authors

Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Detection of line shape parameters in normal and abnormal biological tissues
...Show More Authors

Doppler broadening technique is suggested to monitor the development of tumours. It depends on the sensitivity of positronium (Ps) annihilation parameters to the sub- microstructural changes in biological tissues. This technique uses high resolution HpGe detector to measure the lineshape parameters (S and W) in normal mice's mammary tissues and adenocarcinoma mammary tissues as a function of tumour growth. The results demonstrate that the central parameter (S) decreases and the wing parameter (W) increases as the tumour grow. It is found that the S parameter changes considerably with the distribution of voids which are affected by the tumour development. Therefore the present technique can successfully be employed to monitor the developm

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref