Preferred Language
Articles
/
jpgiafs-378
Risks of Audit under Environment of Information Technology
...Show More Authors

Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronically. According to the international standard of audit No. 400 and it's characterized by risk assessment and internal audit, the risks defined by the International Federation of Accountants (IFAC) they are the risk of misinformation that occurs in account balance or set of transactions that can be Material alone or when combined them with incorrect transactions in other assets or groups which cannot be prevented, detected and corrected them only by the accounting system or internal audit systems opportunely. These risks and challenges that face the accounts auditor were very necessary to keep pace with developments in information technology and they can be able express his technical opinion neutrally in the financial statements. From this point, our research have included four sections focused on the risk of audit job and the possibility of reducing these risks to minimum, and we have reached set of conclusions and recommendations serving auditors and other entities for working purposes professionally to get the efficiency and quality of the audit job.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 25 2013
Journal Name
Isprs International Journal Of Geo-information
Using Geometric Properties to Evaluate Possible Integration of Authoritative and Volunteered Geographic Information
...Show More Authors

The assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und

... Show More
View Publication
Scopus (29)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improve Akaike’s Information Criterion Estimation Based on Denoising of Quadrature Mirror Filter Bank
...Show More Authors

Akaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).

View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Time-Cost Trade-off to Manage A Project in a Fuzzy Environment
...Show More Authors

In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
استهداف السعر كأساس لتحقيق تقنية التكلفة المستهدفة للوحدات الاقتصادية العاملة في بيئة الأعمال الحديثة
...Show More Authors

المقدمة

تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.

وعموماً فإن لعملية التسعير م

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
The reflection of diode technology light emitting (LED) on the modular design of external lighting
...Show More Authors

Search marked (the reflection of diode technology light emitting (LED) on the modular design of external lighting) is an analytical study of the units, external lighting for gardens and adopted in its work on the diode technology emitting light to reach the magnitude of the effect and the change happening where according to this technique was the problem of the research in which is (what emotion the formal and functional units of external lighting according diode technology light emitting) and identified in the first part of it, including the goals came Search of b (statement reversal winning technical transformation of lighting from incandescent bulbs to light emitting diode technology (LED) on each of shape design and the nature of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 28 2023
Journal Name
Journal Of Planner And Development
The role of environmental taxation and environmental incentives to reduce environmental pollution manifestations in the urban environment
...Show More Authors

        The aim of studying the role of environmental taxation is to reduce or mitigate the problem of environmental pollution and obtain a clean environment. And the importance of research lies in the fact that environmental taxation is one of the basic tools to achieve environmental balance. As it is considered one of the sustainable economic tools that focuses on the concept of environmental taxes and fees. Therefore, the incentives stimulated institutions to invest in clean energy and use environmentally friendly machines. Through it, the rules of the competition are updated in favor of organizations that respect the environment so that they can obtain a green competitive advantage. And that the mai

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
Ieee Sensors Journal
Calibrating Distance Sensors for Terrestrial Applications Without Groundtruth Information
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Drug Information Resources in Iraqi Community Pharmacies (Conference Paper) #
...Show More Authors

Abstract

     Drug information resources are the information that is used in medications discovery, utilization, and management. Little information about different types of resources used by Iraqi community pharmacists is known. Therefore, the objectives were to determine drug information resources' type do the pharmacists used and the common drug information questions they faced during their work in community pharmacy. A cross-sectional descriptive study was conducted in different Iraqi provinces and online self-reported survey was introduced through Google Form Software to an appropriate sample of graduated pharmacists who were working in a private community pharmacy and having at least one

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref