Preferred Language
Articles
/
jpgiafs-378
Risks of Audit under Environment of Information Technology
...Show More Authors

Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronically. According to the international standard of audit No. 400 and it's characterized by risk assessment and internal audit, the risks defined by the International Federation of Accountants (IFAC) they are the risk of misinformation that occurs in account balance or set of transactions that can be Material alone or when combined them with incorrect transactions in other assets or groups which cannot be prevented, detected and corrected them only by the accounting system or internal audit systems opportunely. These risks and challenges that face the accounts auditor were very necessary to keep pace with developments in information technology and they can be able express his technical opinion neutrally in the financial statements. From this point, our research have included four sections focused on the risk of audit job and the possibility of reducing these risks to minimum, and we have reached set of conclusions and recommendations serving auditors and other entities for working purposes professionally to get the efficiency and quality of the audit job.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 27 2020
Journal Name
Research Gate
Information Booklet COVID-19 Graphs For Iraq First 3 Months
...Show More Authors

This booklet contains the basic data and graphs forCOVID-19 in Iraq during the first three months of thepandemic ( 24 February to 19 May - 2020 ) , It isperformed to help researchers regarding this health problem (PDF) Information Booklet COVID-19 Graphs For Iraq First 3 Months. Available from: https://www.researchgate.net/publication/341655944_Information_Booklet_COVID-19_Graphs_For_Iraq_First_3_Months#fullTextFileContent [accessed Oct 26 2024].

Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Improving Building Information Modeling (BIM) Implementation throughout the Construction Industry
...Show More Authors

Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Cent

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Reflection of the audit of contracts according to "related services" on the report of the auditor: applied research in Palestine International Hotel Company / shareholding company
...Show More Authors

The issue of auditing contracts according to the related services is one of the important topics It has also become necessary to develop traditional procedures and auditing according to international standards to improve the profession of accounting and auditing. From this standpoint, the research aims to indicate the reflection of the contracting audit in accordance with the related services on the auditor's report. in line with the new directions regarding the need to adopt international standards in the Iraqi environment as the research problem focused on the non-comprehensiveness of the audit programs that deal with auditing contracts according to assurance commitments to contribute obtaining Governing evidence, The research

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Space International Journal Of Space Studies In Architecture And Urban Design
Adaptive Reuse of Traditional Architecture under the Influence of Intelligent Systems
...Show More Authors

Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role and effectiveness of the United Nations Security Council in light of the competition of international powers: an analytical study
...Show More Authors

Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
A proposed guideline for auditing revenues in the Iraqi environment according to IFRS 15
...Show More Authors

   Deficiencies in revenue-related accounting standards, including American accounting standards as well as international accounting standards, prompted the issuance of the International Financial Reporting Standard IFRS 15 "Revenue from contracts with customers" as part of the convergence plan between the FASB and the International Accounting Standards Board (IASB) according to the requirements of The joint venture between the two councils, whereby the standard aims to define the basis for reporting useful information to the users of the financial statements about the nature, amount, timing and uncertainty about the revenues and cash flows arising from a contract with the customer, The standard is base

... Show More
View Publication Preview PDF
Crossref