The research aims to achieve a set of objectives, the most important of which is determining the extent to which the auditors of the research sample in the Federal Bureau of Financial Supervision adhere to the requirements of the quality control system according to the Iraqi Audit Manual No. The federal financial / research sample with the quality control system according to the Iraqi audit guide No. 7), and the researcher seeks to test the main research hypothesis and sub-hypotheses, and to achieve this, a questionnaire was designed by (Google Form) and distributed electronically to the elements of the research sample, Through the statistical package program (SPSS), the results of the questionnaire were analysed. In light of the applied aspect of the research, a number of conclusions were reached, the most important of which are: Existence of policies and procedures in the quality control system designed by the Federal Office of Financial Supervision that give reasonable assurance that auditors comply with the standards and rules of ethical and professional behaviour, The researcher made a number of recommendations, including: Allocating an auditor and his assistants for each audit task to be implemented, with conditions defining the features and characteristics of the head and members of the work team that are compatible with the nature of the audit process entrusted to them to perform.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreThe process of converting coordinates is, still, considered an important and difficult issue due to the way of conversion from geographic ellipsoidal system to the projected flat system. The most common method uses contiguous UTM system as one of the most accurate systems in the conversion process, but the users of the
system face problems related to contiguity, especially at the large areas that lie within more than one zone. The aim of the present research is to solve the problem related to the multiple zones coverage found in the Iraqi territory using a mathematical model based on the use of Taylor series. The most accurate conversion equation used in this paper was based on the 4th order polynomial of two variables. The calculatio
In this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis
تهدف الدراسة الحالية الى استعمال الانموذج اللوجستي ثنائي المعلم في تدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة، والخروج بتعميم لنتائج البحث والوقوف على الاجراءات العلمية المناسبة وتوفير تطبيق عملي علمي صحيح لاعتمادها من قبل الباحثين. وقد اتبعث الباحثة الاسلوب العلمي من خطوات واجراءات في عملية بناء المقياس حيث حدت ابعاد الشخصية الافتراضية المتمثلة بسبع ابعا
... Show Moreاهمية البحث هي مرحلة نمو وبناء اجهزة الجسم للاعبين الاشبال واعداد تدريبات بأسلوب التدريب الدائري لبناء التحمل لتطوير بعض القدرات الحركية والمهارية لدى اللاعبين الاشبال بكرة القدم , حيث لاحظت الباحثة ضعف في مستوى الاداء الحركي ارتأت اعداداً بدنيا ومهارياً منذ مرحلة البناء الأولى للاعب الفئات العمرية , واستخدم الباحث المنهج التجريبي بالاختبار القبلي والبعدي للمجموعتين التجريبية والضابطة لملائمته لطبيعة ال
... Show MoreThe name of princesses Ashraf Bhlwi was associated with very important events influnced on social polical Iranian fact through second half of twentieth century, with access Dr.Mosaddeq to cabinet on May 1951, The conflict seemed between him and princesses Ashraf in creasingly, when Mosaddeq came to authority he had many projects deal with oil industry laws in Iran and reform the elections laws, reducing terms of reference of Al shah and made it honorable only, This matter disturbance Royal court especially, Ashraf, she started to coordinate with members of the shura council and other military personalities in order to over throw Mosaddeq cabinet but she failed because Mosaddeq supported by Irani
... Show MoreAs we know the transportation studies regarded as one of a very
important and difficult studies and one of its difficulties created from the
process of data updating therefore the researcher well facing many difficulties
to balancing between the old data on collecting new data.
The research present an opinion which is summarized by: can we use
the old data after we updated and used it as alternatives? Or the researcher
must collect new data to complete their research which indicate to the present
situation and some times they cant complete their studies because of the
security, economic, temporally difficulties.
The research used two kinds of data, the old data which belong to the
period (1998) and new data
Background: The hip joint and lumbar spine are both anatomically and functionally closely related as had shown by many authors. So the abnormality in one area can affect the other e.g. hip joint osteoarthritis can cause lumbar sagittal malalignment and backache.
Objectives: is to see if there is significant improvement in backache after total hip replacement? And which degree of backache improvement is associated with significant changes in lumbar lordosis?
Methods and patients: a prospective open trial study was performed on 30 patients who had severe hip osteoarthritis and chronic low back pain. Total hip replacement was performed to all patients. Backache and lumbar lordosis were measured by visual analogue scale and Cobb’s an
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More