Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreThe inhibitory behavior of L-Cysteine (Cys) and its derivatives towards iron corrosion through density functional theory (DFT) was investigated. The current research study undertakes a rigorous evaluation of global as well as local reactivity descriptors of the Cys in protonated as well as neutral forms and the changes in reactivity after the combination of Cys into di- and tripeptides. The inhibitory effect of di- and tri-peptides increases since, in the molecular structure, the number of reaction centers increase. We computed the adsorption energies (Eads) and low energy complexes with most stability for the adsorption of small peptides and Cys amino acids onto the surfaces of Fe (1 1 1). We found that the adsorption of tri-peptides onto
... Show MoreEffective management of advanced cancer requires systemic treatment including small molecules that target unique features of aggressive tumor cells. At the same time, tumors are heterogeneous and current evidence suggests that a subpopulation of tumor cells, called tumor initiating or cancer stem cells, are responsible for metastatic dissemination, tumor relapse and possibly drug resistance. Classical apoptotic drugs are less effective against this critical subpopulation. In the course of generating a library of open-chain epothilones, we discovered a new class of small molecule anticancer agents that has no effect on tubulin but instead kills selected cancer cell lines by harnessing reactive oxygen
The study aims to identify the relationship between forgiveness and social intelligence among elementary school students. The study employed a descriptive analytical approach, whereby a total of (500) elementary school student were selected randomly regarding the variable of gender and economical status. Two scales were prepared: one to measure the forgiveness depending on Albort’s theory that consist of (20) item, and the other to measure the social intelligence according to Tony’s theory which composed of (20) item as well. The result revealed that 6th grade students have interested level of the forgiveness and social intelligence, the girl showed significant differences according to the forgiveness variable, the sample
... Show MoreAccurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreIn this study the isomerization of desulfuerized light Iraqi petroleum naphtha (Al-Dura Refinery) with boiling point range of 37 to 124 °C , 80.5 API specific gravity and 68.2 octane number has been investigated. Two types of catalysts were prepared (Pt/HX and Pt/SrX) by impregnation of 0.8 wt% Pt on l 3X-zeolite. The catalyst activity and selectivity toward isomerization, and catalyst deactivation were investigated.
The isomerization unit consisted of a vertical tubular stainless steel reactor of 2 cm internal diameter, 3 cm external diameter and 68 cm height. The operating pressure was atmospheric for all experimental runs. The liquid flow of lightnaphtha was 0.4 Uh, and the catalyst weight was 50 gm, H/
... Show MoreDylan Thomas (1914-1953) is a modern poet belongs to the apocalyptic movement of the 1940's.This movement is influenced by the doctrines and techniques of surrealism.
Poetry for him should not be primarily concerned with man in society, but with the celebration of spiritual truth. It should bring to light the hidden causes, hence his personal interest is to strip darkness and explore the inward motives. To do this he uses a cluster of images: a constant building up and breaking down of images. His poetry depends on the romantic spontaneity, suggestiveness of the Symbolists and the the surrealists' mysterious liberation of the unconsciousness and
... Show More<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show Moreبهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show MoreThe seventh international scientific conference held at the "University of Baghdad" College of Education "Ibn Rushd" 14-15 / 4/2019, confirmed in its recommendations the need to draw clear strategic planning to invest the qualitative inputs from the Ministry of Education and focus on it in higher education, which requires educational institutions to amend from its current strategies or adopting new strategies in a way that contributes to presenting new ways to compete and keep pace with scientific progress and to find realistic and objective working methods. The aim of the current study is to identify the reality of university strategic planning to invest the outputs of the distinguished schools of the heads of public universities. The r
... Show More