Preferred Language
Articles
/
jpgiafs-1283
Enhancing audit procedures in accordance with the international assurance standard through the implementation of a proposed program
...Show More Authors

Abstract:             

                  The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignment, as the auditor is assigned to confirm a specific paragraph of the assurance program by the authority that assigned him. International Auditing Standard (3402) relies on two reports, the first to describe control tools and their design in service facilities, and the second to design them and their operational effectiveness to know the extent of strengths and weaknesses in the service organization, the importance of having cadres with a high scientific and practical level to carry out the task of assurance to reach those reports to the highest level of quality.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
Nauchforum
ROLE OF METAPHOR IN PUPPET IMPLEMENTATION (ON THE EXAMPLE OF D. RUBINA'S NOVEL «PETRUSHKA'S SYNDROME»)
...Show More Authors

The article examines metaphors as one of the fundamental means used by D. Rubina when writing the novel “Parsley Syndrome” to form images of dolls as equal heroes of the work. The author of the article continues research related to the work of Dina Ilinichna Rubina, a representative of modern Russian prose.

Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Suggested Index for studying violent by Environment and Psychology components among Collegian students at a sample in Baghdad City
...Show More Authors

Objective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 06 2024
Journal Name
International Journal Of Applied Engineering & Technology
A PROPOSED LIGHTWEIGHT BLOCK CIPHER SYSTEM EMPLOYING DNA CODES
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Possibility of Applying Quality Management System ISO9001: 2008 in Station Project Al Rustumiya - A Case Study
...Show More Authors

The research study of the possibility of the application of the quality management system under the international standard ISO ISO9001: 2008 in the station project Rustumiya wastewater treatment of the Department of SEWER BAGHDAD - Baghdad MOREALITY as the first step in the right direction towards the implementation of total quality management (TQM), and the research Find the gap between the international standard and the quality system used in the organization surveyed through the use of checklists to analyze the gap, the checklist have included (191) items distributed on five basic requirements, according to the appearance in the international standard, namely, (quality management system, management responsibility, resource man

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
International rights to enhance the active participation of Iraqi youth
...Show More Authors

After the democratic transformation in 2003 in Iraq, young people waited a lot to take their real opportunity to participate in politics, but most of the laws regulating political and electoral work have been unfair to young people, despite developments in laws and legislation, but opportunities did not allow young people to participate in politics, which was reflected It negatively affected their participation in voting and nomination, and even their assumption of public office and positions, which is why they complained about the ruling class and the political system through protests, or when they refused to vote, and this is reflected in the recent parliamentary elections and low participation rates

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 16 2025
Journal Name
Journal Of Physical Education
The Effect of Proposed Exercises Using Sponge Mat On the Level of Performing Offensive Skills in Sitting Volleyball
...Show More Authors

View Publication