Preferred Language
Articles
/
jeasiq-659
Impact of non-current assets impairment reporting on certain financial indicators application on Al-Mansour Pharmaceuticals- a private corporation
...Show More Authors

   This research deals with the financial reporting for non-current assets impairment from the viewpoint of international accounting standards, particularly IAS 36 "Impairment of non-current assets." The research problems focus on the presence of internal and external indicators on impairment of non-current assets in many of companies listed in Iraqi stock exchange. So it is required to apply IAS 36 to reporting for the impairment loss of assets since this impairment impact certain financial indicators. These indicators help users in their decision-making and forecasting future financial situation and the ability of the company to achieve future profits or maintain current profits. The research aims to shedding light on the concept of non-current assets Impairment and the application of IAS 36 and its impact showing in some financial indicators in the research sample company. The results showed the existence of a relationship between the financial reporting for the impairment of non-current assets and certain financial indicators relevant . As there are significant impact for reporting impairment losses of non-current assets in the company's research sample in some financial indicators and after the application of IAS 36 "Impairment of non-current assets" and clearly demonstrates it through the effect of rates of change of financial indicators in the financial statements for those Company before and after the Adjustment

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Population based Study on Self Medication Practice in Pakistan
...Show More Authors

Background: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.

Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.

Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (47)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
A Review on Expansive Soils Stabilized with Different Pozzolanic Materials
...Show More Authors

Soils that cause effective damages to engineer structures (such as pavement and foundation) are called problematic or difficult soils (include collapsible soil, expansive soil, etc.). These damages occur due to poor or unfavorited engineering properties, such as low shear strength, high compressibility, high volume changes, etc. In the case of expansive soil, the problem of the shrink-swell phenomenon, when the soil reacts with water, is more pronounced. To overcome such problems, soils can be treated or stabilized with many stabilization ways (mechanical, chemical, etc.). Such ways can amend the unfavorited soil properties. In this review, the pozzolanic materials have been selected to be presented and discussed as chem

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Sep 29 2017
Journal Name
Journal Of Nursing Scholarship
A Multicountry Perspective on Cultural Competence Among Baccalaureate Nursing Students
...Show More Authors
Abstract<sec><title>Purpose

To assess cultural competence among nursing students from nine countries to provide an international perspective on cultural competence.

Design

A descriptive, cross‐sectional design.

Methods

A convenience sample of 2,163 nursing students from nine countries was surveyed using the Cultural Capacity Scale from April to November 2016.

Results

The study found a moderate range of cultural competence among the students. The ability to teach and guide other nursing colleagues to displ

... Show More
View Publication
Scopus (36)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Tue Jun 25 2024
Journal Name
Biomedical And Pharmacology Journal
Psidium guajava: A Review on Its Pharmacological and Phytochemical Constituents
...Show More Authors

Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl

... Show More
View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref