Preferred Language
Articles
/
jeasiq-570
Are flection Of Accounting for Contingent Assets, Liabilities and Provision on Faithful Representation Characteristic of Accounting Information
...Show More Authors

Abstract                                                                     

This research aims to study the reflection of accounting for contingent assets and liabilities and provisions on Faithful Representation characteristic of accounting information, To achieve this goal has been questionnaire design has been distributed to research sample, which consists of (50) listed company on the Iraq Stock Exchange and from all different sectors.                                                                                          

The research concluded that the measurement and disclosure of contingent assets, liabilities and provisions to achieve Faithful Representation characteristic of Accounting information and sub-characteristics relevant, as it ranged arithmetic mean of the results of testing president hypotheses and its subsidiaries between (19-20) is larger than the arithmetic mean premise of (15). The research recommended to the need for measurement and disclosure for contingent Assets and liabilities and provisions to different groups of users of financial information because of their impact on the credibility of that information, and thus influence the making economic decisions, Moreover need to Punish Companies Administrations That do not disclosure them for  the Responsible Authorities.          

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 04 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
CHIA SEEDS ARE USED TO PRODUCE GLUTEN-FREE BISCUITS: CHIA SEEDS ARE USED TO PRODUCE GLUTEN-FREE BISCUITS
...Show More Authors

White and black chia seeds were used in some food products, such us gluten –free biscuits processing by using rice flour and chia seeds (white and black) with these amonths 112.5, 74.25, 56.25, 27.5 g with 27.5g of quinoa seeds for treatments 1, 2, 3 and 4 respectively, and comparison sensitively with the control treatment which has no additions including the appearance and homogenization of the product, surface cracks, softness, taste and flavor, core color and the specific volume, some microbiological tests were performed for biscuit product after storage for 4 months at 30 and 50°C including bacterial total count and fungal and yeast count, results showed that there weren’t any observation of bacteria or yeast or fungal growth at

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Physical and Chemical Characteristic of Al-Garraf River Water at Waist Province Canal
...Show More Authors

 Monthly variations in Physio-chemical parameters of Al-Garraf water in Waist province, one of the main tributaries of the Tigris River to investigate the water quality of the river from August 2014 to January 2015. The study location situated in the southeastern sector of Iraq and surrounded by wide and fertile agricultural lands. Three stations were selected for collecting  samples monthly, samples were taken each month. Station one is located at 500 m of  the AL - KUT Dam. The second is situated at distance of 15 Km away from the former (Kut- Muwafaqiya) and the latter station is located at 18 Km apart from the second one upon entering the river hand Muwafaqiya.  In the present study fourteen physical and chemical

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 16 2019
Journal Name
Journal Of Legal Sciences
Compensation for civil liability arising from media damages
...Show More Authors

Freedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.

View Publication
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT
...Show More Authors

Abstract:-

The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.

In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.

I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Developing and Organizing an Easy Work Environment for Users of Computers Using Information Technology
...Show More Authors

The study aims to implement a serial security technology system to organize a comfortable work environment for users of computers in the General Directorate of Education in Baghdad Karkh3. The most important findings of the study are the application of a serial technology system. It is connected with scientific goals that show the scientific structure of computer learning and its applications.  It considers global learning systems and take into account the ease and scientific flow of the class of elderly employees. In addition, employees of other categories, are the outputs of the sequential technological system. The aim is to create a purposeful technological system and keep pace with global developments, to gain experience, skills and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy
Information and Communication Technology and its Impact on Improving the Quality of Engineering Education Systems
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Alpha Tracks Examination for Female Urine Samples who are Suffering from Urinary Tract Infections
...Show More Authors

Urine samples had been gathered from females living in Baghdad city. The sample consisted of 30 females who suffered from U.T.I (Urinary tract infections) and 20 healthy females. The type of urine U.T.I was specified by the emergency lab in Al-Kindy hospital, and alpha tracks were determined by the nuclear track detector CR-39. The concentrations of alpha in 30 urine samples taken from females who had U.T.I ranged from 0.327ppm-1.583ppm, with an average of 0.94965 ppm. The maximum value 1.583 ppm is belonging to females with an aged 57 years old. The results of healthy female concentration ranged from 0.022 ppm-0.459ppm with an average of (0.30855ppm). The findings revealed that alpha emitter concentrations differed from woman to woman,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Considerable use of computers and the Internet in managing public relations activities The Ministries of Justice and the Interior are examples
...Show More Authors

She noted most of the results of research conducted on the use of computers and the Internet in the areas of administrative, economic, agricultural and educational to a significant improvement in learning outcomes of these groups in the development of mechanisms of action, has increased rates of computer use and applications in various spheres of life at very fast pace so that the computer and the Internet is a vital part of any activity, whether administrative or research or the media, hence it can be said that the use of computers and the Internet in the management of public relations activities in any organization can accelerate the pace of echo positive goals and purposes of public relations, this study comes to looking at us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More