The research aims to achieve a set of objectives, the most important of which is determining the extent to which the auditors of the research sample in the Federal Bureau of Financial Supervision adhere to the requirements of the quality control system according to the Iraqi Audit Manual No. The federal financial / research sample with the quality control system according to the Iraqi audit guide No. 7), and the researcher seeks to test the main research hypothesis and sub-hypotheses, and to achieve this, a questionnaire was designed by (Google Form) and distributed electronically to the elements of the research sample, Through the statistical package program (SPSS), the results of the questionnaire were analysed. In light of the applied aspect of the research, a number of conclusions were reached, the most important of which are: Existence of policies and procedures in the quality control system designed by the Federal Office of Financial Supervision that give reasonable assurance that auditors comply with the standards and rules of ethical and professional behaviour, The researcher made a number of recommendations, including: Allocating an auditor and his assistants for each audit task to be implemented, with conditions defining the features and characteristics of the head and members of the work team that are compatible with the nature of the audit process entrusted to them to perform.
this research aims it measure the technical efficiency of the branches of the General Company for Land Transport, That scattered geographically at country level, by Data Envelopment analysis (DEA) technique, as this technique relies on measuring the efficiency of a set of asymmetric Decision making units, which is one of the nonparametric mathematical methods for and application related to Linear Programming, and this is what helps the General Company for Land Transport to diagnose its branches performance by benchmarking with each other and determine the performance gap. The research found that there is variation in the level of efficiency in the company's branches
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreOpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show Moreتهدف الدراسة الحالية الى استعمال الانموذج اللوجستي ثنائي المعلم في تدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة، والخروج بتعميم لنتائج البحث والوقوف على الاجراءات العلمية المناسبة وتوفير تطبيق عملي علمي صحيح لاعتمادها من قبل الباحثين. وقد اتبعث الباحثة الاسلوب العلمي من خطوات واجراءات في عملية بناء المقياس حيث حدت ابعاد الشخصية الافتراضية المتمثلة بسبع ابعا
... Show Moreاهمية البحث هي مرحلة نمو وبناء اجهزة الجسم للاعبين الاشبال واعداد تدريبات بأسلوب التدريب الدائري لبناء التحمل لتطوير بعض القدرات الحركية والمهارية لدى اللاعبين الاشبال بكرة القدم , حيث لاحظت الباحثة ضعف في مستوى الاداء الحركي ارتأت اعداداً بدنيا ومهارياً منذ مرحلة البناء الأولى للاعب الفئات العمرية , واستخدم الباحث المنهج التجريبي بالاختبار القبلي والبعدي للمجموعتين التجريبية والضابطة لملائمته لطبيعة ال
... Show MoreThe name of princesses Ashraf Bhlwi was associated with very important events influnced on social polical Iranian fact through second half of twentieth century, with access Dr.Mosaddeq to cabinet on May 1951, The conflict seemed between him and princesses Ashraf in creasingly, when Mosaddeq came to authority he had many projects deal with oil industry laws in Iran and reform the elections laws, reducing terms of reference of Al shah and made it honorable only, This matter disturbance Royal court especially, Ashraf, she started to coordinate with members of the shura council and other military personalities in order to over throw Mosaddeq cabinet but she failed because Mosaddeq supported by Irani
... Show MoreAs we know the transportation studies regarded as one of a very
important and difficult studies and one of its difficulties created from the
process of data updating therefore the researcher well facing many difficulties
to balancing between the old data on collecting new data.
The research present an opinion which is summarized by: can we use
the old data after we updated and used it as alternatives? Or the researcher
must collect new data to complete their research which indicate to the present
situation and some times they cant complete their studies because of the
security, economic, temporally difficulties.
The research used two kinds of data, the old data which belong to the
period (1998) and new data
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAbstract:
This research aims to identify the type of cultural values prevailing in the Ramadi General Hospital, and Baghdad, educational, and whether the organization's culture values play a role in improving the quality of nursing care service in hospitals, and how different cultural values of the nurses between Ramadi Teaching Hospital and General education Baghdad Hospital because of the nature social and cultural Different each region, including the research sample of all nurses working in Baghdad Teaching Hospital, and Ramadi educational-General, adopted Find descriptive analytical approach adopted scale developer (Hofstede, 1991) and (Furrer et al, 2000) And pres
... Show More