Preferred Language
Articles
/
jeasiq-570
Are flection Of Accounting for Contingent Assets, Liabilities and Provision on Faithful Representation Characteristic of Accounting Information
...Show More Authors

Abstract                                                                     

This research aims to study the reflection of accounting for contingent assets and liabilities and provisions on Faithful Representation characteristic of accounting information, To achieve this goal has been questionnaire design has been distributed to research sample, which consists of (50) listed company on the Iraq Stock Exchange and from all different sectors.                                                                                          

The research concluded that the measurement and disclosure of contingent assets, liabilities and provisions to achieve Faithful Representation characteristic of Accounting information and sub-characteristics relevant, as it ranged arithmetic mean of the results of testing president hypotheses and its subsidiaries between (19-20) is larger than the arithmetic mean premise of (15). The research recommended to the need for measurement and disclosure for contingent Assets and liabilities and provisions to different groups of users of financial information because of their impact on the credibility of that information, and thus influence the making economic decisions, Moreover need to Punish Companies Administrations That do not disclosure them for  the Responsible Authorities.          

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Using the Information Technology on The Audit Profession: A Study of the Sample of Auditor Viewpoints in Selected Arab Countries
...Show More Authors

This study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in  developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in  Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 11 2025
Journal Name
Journal Of Babylon Center For Humanities Studies
Reflection of Zionism in the literature of the Jews of Iraq ... Read in the novel "The Dove Flyer" by Elie Amir
...Show More Authors

The upbringing of Yehuda Amichai and the conditions he lived in had a great influence on his deep sense of pain, which made him think of death and suicide. Especially after the Nazis came to power in Germany, and his emigration with his family. Amichai searched for love throughout his life, and his failure was one of the most important factors affecting his psyche, which is A deep influence that made him live in harsh and painful pains that broke him, and prevented her from achieving his ambitions in life.Dramatic texts are characterized by repetition in writing and presentation. It is a textual discourse that has two advantages, first, that it can be read as a literary text like all other literary texts, and second, that it can be consider

... Show More
View Publication
Publication Date
Wed Jan 15 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The responsibility of the administration in compliance with the going concern assumption during the preparation for their financial statements: Research practically at muster of companies
...Show More Authors

This research aims to demonstrate the impact of the going concern assumption in different accounting applications to provide a realistic look and more accurate result of activity and financial situation, as well as determining the responsibility of the Company's administration in compliance with the going concern assumption during the preparation for their financial statements, and to clarify the concept of integration between internal audit and external audit about going concern assumption, besides its importance and usefulness on the work of both of the internal auditor and the external auditor, as well as on the company under auditing process.This research purports preparing an internal audit program, including a set of auditing actio

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Characteristic Zero Resolution of Weyl Module in the Case of the Partition (8,7,3)
...Show More Authors
Abstract<p>In this paper, we studied the resolution of Weyl module for characteristic zero in the case of partition (8,7,3) by using mapping Cone which enables us to get the results without depended on the resolution of Weyl module for characteristic free for the same partition.</p>
View Publication
Scopus (10)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Ieee Sensors Journal
Calibrating Distance Sensors for Terrestrial Applications Without Groundtruth Information
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Fri Oct 25 2024
Journal Name
The Review Of Contemporary Scientific And Academic Studies
The Representation of Men and Women in the Black and White Streams of the Second Wave of Feminism: A Corpus Stylistic Analysis
...Show More Authors

View Publication
Crossref
Publication Date
Sun Oct 20 2024
Journal Name
Baghdad Science Journal
Modules Whose St-Closed Submodules are Fully Invariant
...Show More Authors

The duo module plays an important role in the module theory. Many researchers generalized this concept such as Ozcan AC, Hadi IMA and Ahmed MA. It is known that in a duo module, every submodule is fully invariant. This paper used the class of St-closed submodules to work out a module with the feature that all St-closed submodules are fully invariant. Such a module is called an Stc-duo module. This class of modules contains the duo module properly as well as the CL-duo module which was introduced by Ahmed MA. The behaviour of this new kind of module was considered and studied in detail,for instance, the hereditary property of the St-duo module was investigated, as the result; under certain conditions, every St-cl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you

... Show More
View Publication
Crossref (2)
Crossref