The success of any institution must be based on means to protect its resources and assets from the waste, loss, misuse and the availability of accurate and reliable data by accounting reports to increase its operational efficiency, namely, that the internal control system is considered as a safety valve for top management in any economic unit. The problem is represented by the need for an efficient system, so to ensure its success, there must exist external parties which monitor and evaluate the performance because of its importance by following clear criteria. So, the research problem came to address performance evaluation indicators which are set by the Federal Board of Supreme Audit (FBSA) and identify the extent of its contribution to achieving an efficient system for the General Commission of Taxes (GCT), fulfil the requirements of the tax reform and identify shortcomings in these indicators, and determine the role of internal control in the GCT to achieve the aspirations of the FBSA to raise the efficiency of tax work performance. The aim of the research stems from the knowledge of the role of the FBSA in evaluating the performance to raise the efficiency of the internal control system and the tax administration in general, as well as find out how to use modern and possible methods and techniques in the control process over tax procedures, and research importance shows the role of the FBSA in evaluating the tax administration performance. The internal control is considered of the fundamental foundations of management's performance and this is an important and indispensable stage of the tax collection mechanism as a whole, being the cornerstones of the tax system and these could be the cause of achieving the desired economy, and that the use of an efficient system for control with a scientific manner that increases the effectiveness of management's performance.
This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreMany researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc
... Show MoreThe present study investigates deep eutectic solvents (DESs) as potential media for enzymatic hydrolysis. A series of ternary ammonium and phosphonium-based DESs were prepared at different molar ratios by mixing with aqueous glycerol (85%). The physicochemical properties including surface tension, conductivity, density, and viscosity were measured at a temperature range of 298.15 K – 363.15 K. The eutectic points were highly influenced by the variation of temperature. The eutectic point of the choline chloride: glycerol: water (ratio of 1: 2.55: 2.28) and methyltriphenylphosphonium bromide:glycerol:water (ratio of 1: 4.25: 3.75) is 213.4 K and 255.8 K, respectively. The stability of the lipase enzyme isolated from porcine pancreas (PPL) a
... Show MoreRemoval of solar brown and direct black dyes by coagulation with two aluminum based
coagulants was conducted. The main objective is to examine the efficiency of these
coagulants in the treatment of dye polluted water discharged from Al-Kadhymia Textile
Company (Baghdad-Iraq). The performance of these coagulants was investigated through
jar test by comparing dye percent removal at different wastewater pH, coagulant dose,
and initial dye concentration. Results show that alum works better than PAC under acidic
media (5-6) and PAC works better under basic media (7-8) in the removal of both solar
brown and direct black dyes. Higher doses of PAC were required to achieve the
maximum removal efficiency under optimum pH co
Recently, it has been revealed that Toxoplasmosis may be associated with some factors related to type 2 diabetes, such as glucose, insulin, the Homeostatic Model Assessment for Insulin Resistant (HOMA-IR), and Fatty acid binding protein (FABP). Therefore, the current study aimed to specify how Toxoplasma gondii (T.gondii) infection affects glucose, insulin, HOMA-IR, and FABP among adolescents. From October to December 2022, this study was carried out at Al Madain Hospital in Baghdad. For a group of adolescents visiting the hospital, an ELISA test was performed to check their anti-T.gondii antibodies. Ninety adolescents were selected to participate in the study on the basis of this examination. They were divided into two groups: those who te
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThis work presents an investigation on the fabrication and characterization of Fe doped zeolitic imidazolate framework (ZIF-8) of 1:1 M ratio of Zn:Fe (Fe/Zn-ZIF-8) and adsorption performances of acquired materials. The synthesized Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 materials were characterized for the phase structure, morphology, elemental analysis and surface area by using X-ray diffraction (XRD), Field emission scanning electron microscope (FESEM), Energy Dispersive X-Ray (EDX), and BET surface area, respectively. The results revealed the adsorption capacity was enhanced by incorporation of Fe into ZIF-8 structure. The CR dye adsorption capacities were 287, 219, and 412 mg/g for Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 adsorbers, respectivel
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More