Preferred Language
Articles
/
jeasiq-859
The use of value chain analysis of information in determining the most important the accounting information
...Show More Authors

The use  analysis  value chain such  information in the provision as financial  so information quality meet and satisfy the needs of users such information , particularly investors and lenders   as the identification needs   financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances   theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the behavior   users as accounting information to reflect the information shown in the financial statements of their preferences and then fit their use of current and futuristic  through interpretation and prediction of their behavior , which is one of the essential  activities  in value   information has been the use in which information determining  characteristics  and convenience of representation sincere more important for As is the quality of accounting information  the grade benefit  if they were employed   information in the best possible way for the benefit of the users of information dissimilar not only to their forms decision but also in terms of their behavior and style of their awareness depending on the way of thinking and reflexes and response to cognitive-based culture, accounting, administrative, and the time period  financial statements because the more realize and understand user information whenever they are more suitable for decision adds to know where his

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Modern Sport
دراسة علاقة بعض مؤشرات وضع القوة لذوي الإعاقة فئة (٤٠f ) بدفع الثقل من التقاطع بالإنجاز
...Show More Authors

تعد فعالية دفع الثقل واحده من الفعاليات المميزة بألعاب القوى، وهي أحدى فعاليات الرمي الأربعة (رمي الرمح, رمي القرص, أطاحة المطرقة, دفع الثقل) وتطلب قدرات بدنية وقابليات حركية خاصة والتي تعتمد بشكل فعَال ومؤثر على النواحي البايوميكانيكية, خصوصا عندما يتعلق الأمر بذوي الأعاقة ومنهم فئة (40f) والذين يتمتعون بدعم كبير من المجتمع الدولي بصورة عامة وفي بلدانهم بصورة خاصة وأمكانية تطوير أنجازاتهم لرفع أسم بلدانه

... Show More
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم السياسية
الوعي المجتمعي و دوره في بناء الدولة العربية : رؤية فكرية
...Show More Authors

لا يخفى على الجميع من ان الفرد العربي يعاني من ضعف الوعي بالذات الوعي السياسي ، مما جعل الدولة و اهمية وجودها و المحافظة على مؤسساتها ليست ضمن اهتماماته مما جعل الباحثين يتساءلون عن امكانية  تعزيزه و مدى تأثير ذلك على مستقبل بناء الدولة العربية المعاصرة  ، لذلك حاولت الدراسة تناول موضوع الوعي المجتمعي وأثره في بناء الدولة من خلال رؤية فكرية واضحة المعالم، مزجت بين ما هو اجتماعي وسياسي لتحديد مفهوم الوعي

... Show More
View Publication
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics and Communication
...Show More Authors

Verbal Communication is linked with the social event no matter how different Communities in their cultures and styles of living and it's intuitions and political systems remain involved in its need . It is a dialogue , a pillar of human Communication , all Communication process conditional on the where a bouts of the shrine and the cycle of words . Semiotics is based on two principles important to Communicate : one : offer intended to report to the speaker . And the other : The recipient of the message a (know led gment of this intent . And learn to measure intent rely on two types of units ; first is the evidence for which is available for reporting the intent and the other : Signals . semiotics Communicate evidence bother as a channel

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 11 2017
Journal Name
Journal: Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of some Metal Complexes with (3Z ,5Z, 8Z)-2-azido-8-[azido(3Z,5Z)-2-azido-2,6- bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide(L-AZ) .
...Show More Authors

The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i

... Show More
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Mosaic art as a cultural decorative aspect and contemporary mosaic re-employment: محمد طلال عبد آل عبد الله
...Show More Authors
  • Islamic art is applied art that searches for everything that is useful and beneficial and Both are properties of Islamic art. Islamic art has many well-established elements and styles and pictures that distinguish it from the rest of the arts among those elements and methods that were used in the architectural cladding artwork Or mosaic murals and mosaic was known in its first form in Babylon in a primitive style similar to it, but the Muslim artist in the era of the Caliphs made the art of mosaic In mosques and palaces.
    Chapter one: This chapter is concerned with introducing the art of mosaic historically and focusing on it.
    Chapter Two: This chapter deals with contemporary Islamic mosaics, especially in Mecca
... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 10 2022
Journal Name
Journal Of Tikrit University For Humanities
إمارة الحج في عهد الخليفة هارون الرشيد (170-193هـ/ 786- 808م)
...Show More Authors

عند الكتابة عن إمارة الحج في الدولة العربية الإسلامية لابد من التوقف عند المدة الزمنية للخليفة الرشيد لأهميتها في معرفة تطور الأحداث التاريخية وأبعادها، فمن خلال تتبع من تولى تلك الإمارة يمكن لنا استنتاج أمور عدة عن المنهج السياسي الذي كان يعتمده الخليفة الرشيد  في إدارة الدولة.

View Publication
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col

... Show More
View Publication Preview PDF
Crossref (1)
Crossref