Preferred Language
Articles
/
jpgiafs-109
The Role of Benford’s law to appreciation the risk in financial transactions: Application study in Baghdad University
...Show More Authors

The financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is contributions to fraud detection, the Benford’s law is consider control tool and one from this Techniques that using in multiple sides in the Audit and control, and statically method provide indict to auditor about risk level in balances for accounts and transaction. The research aims to shed light the role of Auditor in risk appreciation and information control, and important Benford’s law in appreciation a fraud detection risk in financial fraud in audit.The Researchers have found gropes from conclusions its important; the Benford’s law is control tool contribution in appreciation a fraud risk actively, as well as the role it’s in the fraud detection. The researchers are grope recommendations important its should from Auditor using modern tools in audit and financial control, And the Benford’s is consider one from this technique.

Keyword: Benford’s law, fraud, detection risk.

Crossref
View Publication
Publication Date
Tue Aug 24 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A plan for transportation and distribution the products based on multi-objective travelling salesman problem in fuzzy environmental
...Show More Authors

Transportation and distribution are the most important elements in the work system for any company, which are of great importance in the success of the chain work. Al-Rabee factory is one of the largest ice cream factories in Iraq and it is considered one of the most productive and diversified factories with products where its products cover most areas of the capital Baghdad, however, it lacks a distribution system based on scientific and mathematical methods to work in the transportation and distribution processes, moreover, these processes need a set of important data that cannot in any way be separated from the reality of fuzziness industrial environment in Iraq, which led to use the fuzzy sets theory to reduce the levels of uncertainty.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of International Oral Health
Endothelin-1 is a surrogate biomarker link severe periodontitis and endothelial dysfunction in hypertensive patients: The potential nexus
...Show More Authors

Aim and Objectives: The objective of this study was to illustrate the link between periodontitis (PO) and endothelial dysfunction in hypertensive patients. Materials and Methods: This cross‑sectional study involved 53 hypertensive patients with or without PO compared with 28 healthy controls. On the basis of the study protocol, the participants were divided into three groups: Group (1): 24 patients with hypertension only, Group (2): 29 patients with hypertension and PO, and Group (3): 28 healthy controls. Lipid profile, endothelin‑1 (ET‑1), and high‑sensitivity C‑reactive protein (hs‑CRP) were measured. Blood pressure and body mass index (BMI) were evaluated. Diagnostic criteria of severe PO periodontal indices including plaque

... Show More
View Publication
Scopus (19)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Medical Research Archives
Genetic Polymorphism for the Gene Encoding Endoplasmic Reticulum Aminopeptidase-1 (ERAP-1) in Iraqi Patients with Ankylosing Spondylitis
...Show More Authors

Ankylosing spondylitis (AS) is a common, highly heritable inflammatory arthritis affecting primarily the spine and pelvis. This study was aimed to investigate the relationship between the rs27044 polymorphism in Endoplasmic reticulum aminopeptidase-1 (ERAP-1) with the susceptibility and severity of AS correlated with some biochemical markers such as hematological parameter (Erythrocytes sedimentation rate (ESR)) and immunological parameters (C-reactive protein (CRP), Human leukocyte antigen-B27 (HLA-B27), Interlukin-6 (IL-6) and Interlukin-23 (IL-23)), and oxidative stress parameters (Glutathione (GSH) and Malondialdehyde (MDA)) in a sample of Iraqi population. A total of 60 blood samples were collected from AS patients requited Rhe

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Applied Energy
Solidification enhancement with multiple PCMs, cascaded metal foam and nanoparticles in the shell-and-tube energy storage system
...Show More Authors

View Publication
Scopus (279)
Crossref (273)
Scopus Clarivate Crossref
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Al-Bayhaqi’s Preferred Opinions in his Book Al-Khilafiyat-Chapter of Breastfeeding: عذراء حميد فريح , وايمن عبد القادر الهيتي
...Show More Authors

This research is a comparative jurisprudential study that focuses on Imam Al-Bayhaqi’s preferred opinions in his book Al-Khilafiyat (The Disagreements), the part of Al-Rida’a (Breastfeeding). It is considered one of the most important familial topics that is concerned with organizing the social relations in Islam, strengthens the family ties and that prevents the family disintegration due to the ignorance and lack in comprehending Sharia laws (Islam law) in all aspects. The study follows the inductive and descriptive method. It aims at examining the prohibition of marriage when breastfeeding takes place at the time of woman’s conversion to Islam or during her infidelity period. It further aims at verifying the prohibition

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
Training Program based on Some Strategies of Self-Regulated Learning for the Teachers of Mathematics and its Effect on their Relational Mathematics
...Show More Authors

This research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2016
Journal Name
European Journal Of Oral Sciences
Experimental polyethylene-hydroxyapatite carrier-based endodontic system: an in vitro study on dynamic thermomechanical properties, sealing ability, and measurements of micro-computed tomography voids
...Show More Authors

The dynamic thermomechanical properties, sealing ability, and voids formation of an experimental obturation hydroxyapatite-reinforced polyethylene (HA/PE) composite/carrier system were investigated and compared with those of a commercial system [GuttaCore (GC)]. The HA/PE system was specifically designed using a melt-extrusion process. The viscoelastic properties of HA/PE were determined using a dynamic thermomechanical analyser. Human single-rooted teeth were endodontically instrumented and obturated using HA/PE or GC systems, and then sealing ability was assessed using a fluid filtration system. In addition, micro-computed tomography (μCT) was used to quantify apparent voids within the root-canal space. The data were statistically analys

... Show More
View Publication
Crossref (7)
Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Open Veterinary Journal
<b>Molecular study of <i>Streptococcus equi</i> isolated from horses with strangles in Iraq</b>
...Show More Authors

Background: Strangles is a highly contagious equine respiratory disease caused by Streptococcus equi subsp. equi. It is a globally significant pathogen and one of the most common infectious agents in horses. In Iraq, no sequencing data on this pathogen are available, and only two molecular studies have been published to date. This study provides preliminary insights into strain diversity and provides a foundation for future large-scale investigations. Aim: This study aimed to investigate the molecular characteristics, identify SeM gene alleles, and perform a phylogenetic analysis of S. equi isolates from horses in Baghdad, Iraq. Methods: We analyzed 59 Streptococcus spp. isolates previously obtained from equine clinical sample

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref