
The accountants are preparing the financial statements under the Monetary Unit Stability Assumption without taking into consideration the changement of prices for the monetary unit. The income statement accounts containing different items of expenses and revenues. These items are not paid or obtained at one date, because the value of monetary unit is changing from one date to another , also the financial position contains different items of current and fixed assets, also contains different items of long-term liabilities and ownership rights, the continuity of applying historical cost principle will make the financial statements misleading, The adoption of financial analyst of these statements will affects
... Show MoreThis study aims to analyze the messages of a number of global news outlets on Twitter. In order to clarify the news outlets tactics of reporting, the subjects and focus during the crisis related to the spread of the Covid-19 virus. The study sample was chosen in a deliberate manner to provide descriptive results. Three news sites were selected: two of the most followed, professional and famous international news sites: New York Times and the Guardian, and one Arab news site: Al-Arabiya channel.
A total of 18,085 tweets were analyzed for the three accounts during the period from (1/3/2020) to (8/4/2020). A content analysis form was used to analyze the content of the news coverage. The results indicate an increase in th
... Show MoreThis growing interest of the international scientific specialized commissions is due to the role that the audit committee can play, as one of companies’ governance tools, to increase the accuracy and transparency of the financial information disclosed by the companies, through its oversight role on the process of preparing financial reports, its supervision on the internal audit function within the companies, and supporting its independency, as well as coordinating the efforts between the internal control unites and the external auditor represented by the (Board of Supreme Audit) to clear the observations and irregularities in order to reduce the fraud cases.
This research was built on an applied sample of audit committee works
... Show MoreThe study aimed to prepare a set of qualifying exercises to improve the muscular strength of the muscles surrounding the ankle joint by applying different resistances according to the nature of the movement of this joint, which is one of the second moving joints (flexion, extension and rotation of the right and left) in order to increase the efficiency of all muscles working on this joint according to those movements and identification On the impact of these exercises and assume that there will be statistical differences between the two tests of the research sample. The researcher used the semi-articulated experimental method with a pre- and post-test for one group. The injury was evaluated on the women's national team players durin
... Show MoreAsthma is a chronic inflammatory disorder of the airways in which many cells and cellular elements play a role. The treatment guidelines recommend theuse of a second controller drug in addition to medium doses of inhaled corticosteroids (ICSs) rather than the use of high doses ICS alone in the treatment of moderate-severe persistent asthma. This study was conducted to compare the clinical efficacy and safety of three treatment regimens in Iraqi patients with moderate-severe persistent asthma.The study included three groups; each group included 15 patients. Patients were administered beclomethasone inhaler alone 1500-2000 μg/day, beclomethasone inhaler 750-1000 μg/day plus oral controlled release aminophylline tablets 450 mg/day or
... Show MoreThe study aimed at identifying the mental capacity of the research sample and classifying them for the purposes of the study, preparing the scale of cognitive control of the subject of teaching methods of sports education, preparing educational units by establishing the question network for the subject of the teaching methods of sports education, and adopting the experimental method by experimental design workers (2×2) for the two groups The limits of the research community are represented by third-stage students of the Department of Physical Education and Sports Science in the morning study of the College of Knowledge, the Community University, which continues in the regular working hours of the year (2019-2020) adult Their number
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More