Preferred Language
Articles
/
jpgiafs-1093
Procedures for auditing accounting violations according to international auditing : standards in the Karbala Municipality Directorate
...Show More Authors

The research aims to identify the definitional framework for accounting violations and audit procedures in accordance with international auditing standards, preparing a proposed audit program to audit violations resulting from the transition to the unified accounting system in the research sample according to the relevant international auditing standards, as the proposed audit program was prepared according to International auditing standards in order to improve the auditor’s procedures in detecting accounting violations when auditing the financial statements of municipal departments. The research concluded the most important recommendations: The necessity of adopting the audit program proposed by the researcher, for the purpose of activating audit procedures in detecting accounting violations in the financial statements and obligating them to do so

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Development and Implementation a Programmable Model for Evaluation Pumping Technique
...Show More Authors

This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Possibility of reusing Al-Machraya River for feeding Hawizeh marsh
...Show More Authors

Al Machraya River was considered as one of the water feeders of Hawizeh Marsh. In 1986, the outlet of this river into the marsh was blocked and the river was used as a main channel for the East Tigris Irrigation Project near Kalat Salih. This causes significant decrease in the available water supply sources, deterioration in the water quality distribution patterns and increasing the stagnation areas within the marsh. This research aims to study the possibility of reusing this river for feeding Hawizeh Marsh. A frequency analysis study was carried out to study the maximum and minimum probable water level (MMPWL) of Tigris River at the upstream of Kalat Salih Barrage. Six statistical models; Normal distribution, Log-Normal type II, Lo

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
ORGANOCLAY FOR ADSORPTION OF BINARY SYSTEM OF POLLUTANTS FROM WASTEWATER
...Show More Authors

single and binary competitive sorption of phenol and p-nitrophenol onto clay modified with
quaternary ammonium (Hexadecyltrimethyl ammonium ) was investigated to obtain the
adsorption isotherms constants for each solutes. The modified clay was prepared from
blending of local bentonite with quaternary ammonium . The organoclay was characterized
by cation exchange capacity. and surface area. The results show that paranitrophenol is
being adsorbed faster than phenol . The experimental data for each solute was fitted well with
the Freundlich isotherm model for single solute and with the combination of Freundlich-
Langmuier model for binary system .

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Boundary & Geometric Region Features Image Segmentation for Quadtree Partitioning Scheme
...Show More Authors

In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.

Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Mental Health and Its Relationship with Shyness for University Students
...Show More Authors

This study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students  ,          ( 100) males and  ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim  ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .

Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
Fractional CO2 Laser for Treatment of Female Stress Urinary Incontinence
...Show More Authors

Background: Urinary incontinence (UI) is a common disorder that affects women of various ages and impacts all aspects of life. This condition negatively influences quality of life. Fractional CO2 laser (10600nm) is the recent method for treatment of stress urinary incontinence in women. Objectives: The purpose of the study was to evaluate the efficacy and safety of fractional CO2 laser (10600nm) in the treatment of female stress urinary incontinence. Materials & Methods: This study was done from July 2020 to February 2021conducted at the laser institute for postgraduate studies university of Baghdad, patients collected from a private clinic and the Department of

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More