Abstract:
The research seeks to explain the role of the international auditing standard (3402) in the auditor's procedures, where the importance of the research stems from the adoption of international auditing standards in the Iraqi environment, including the standard (3402) of assurance engagements that the external auditor performs by submitting reports on the design of control tools and their operational effectiveness in a service facility that provides the beneficiaries with a service. To provide useful information for service organizations The control tools are of great benefit in rationalizing decisions, and many recommendations have been reached, the most important of which is that the application of the international auditing standard (3402) by the service organization leads to strengthening audit procedures, that relying on the reasonable assurance process for the purpose of reducing risks to an acceptable level and enhancing confidence among the beneficiaries.
The aim of the research is to demonstrate the impact of the dimensions of the marketing vigilance represented by (environmental scanning, diagnostic capacity, validity and decision-making) and to attract deposits represented by (customer relationship management strategy, distribution strategy (location), promotion strategy), as the research was applied in each of Banks (Assyria International, Iraqi Middle East Investment, Business Bay, Iraqi Investment, Babel, Al Mansour Investment), and the questionnaire was adopted as a main tool for collecting data and information from a sample of (110) who are in the position (department manager, department manager, assistant Section Director, Division Officer, Unit Officer), and the statistical prog
... Show MoreAbstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup
... Show MoreThe aim of the research is to use this technique and to determine the effect of this method in reduce cost per unit of the company. The traditional method used in the company the research sample to determine the indirect costs, the definition of the concepts and characteristics of the method of cost-based activity and the cost method based on time-driven activity and justifications applied to companies. In order to achieve the research objectives, the main hypotheses were formulated. That was represented: (The applied of (TDABC) Time driven activity based costing method in reducing indirect costs, leads reduce cost per unit than the use of the traditional method of allocating indirect costs in the research sample company).&nb
... Show MoreThe solution to the problems and challenges of the twenty-first century requires the absorption of many transformations, such as demographic change, poverty reduction, the expansion of safe and clean energy without affecting the environment, as well as reducing health risks and other transitions. It also requires greater cooperation than is possible in the current global system, because both of these constraints and challenges, even if addressed locally or nationally, are because of the potential for their transnational impact, that is, their impact on the lives of people at the global level, Which is necessary to be fully addressed unless it is guided by a comprehensive global vision. This is what environmental governance provides in te
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe research involves using phenol – formaldehyde (Novolak) resin as matrix for making composite material, while glass fiber type (E) was used as reinforcing materials. The specimen of the composite material is reinforced with (60%) ratio of glass fiber.
The impregnation method is used in test sample preparation, using molding by pressure presses.
All samples were exposure to (Co60) gamma rays of an average energy (2.5)Mev. The total doses were (208, 312 and 728) KGy.
The mechanical tests (bending, bending strength, shear force, impact strength and surface indentation) were performed on un irradiated and irrad
... Show More
Abstract
The miraculous of al-Quran has been surrounded by the attention of scholars, as it is the one that has astonished the rhetoricians with its eloquence. So , they paid attention to every part of it and hugely they studied it with accuracy in respect to its Surah ad Ayahs. It is considered the most important source from which Arab scholars and early grammarians drew, given their unanimity that it is the highest degree of eloquence and the best record of the common literary language.
Among these sciences is the science of Grammar, and without Qur’an, this science would not have emerged, which later had control over every science of Arabic
... Show Moreم. د. ولاء طارق حميد, Al. Qadisiya journal for the Sciences of Physical Education, 2017
This study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877, Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae is the lesser species.
A summary of the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi
... Show MoreBackground: Trauma is one of the most common
clinical problems that confront the maxillofacial
surgeon and radiologist alike. Middle third facial
fractures are diagnosed primarily on the bases of
clinical examination and plain radiographs than can
result in much preoperative speculation.
Objective: To assess the advantages of spiral
computerized tomography over conventional
radiography in the pre-surgical evaluation of middle
third facial fractures.
Methods: Thirty patients with thirty-eight facial
fractures were studied, all patients were examined
clinically, by plain radiography and then by spiral CT.
Results: Of the 38 middle-third fractures, 16
(42.1%) were zygomatic fractures, 8 (21.1%) were