Preferred Language
Articles
/
jpgiafs-409
Evaluation the Procedure for Recognition of Income Tax to Reduce Tax Evasion: بحث تطبيقي في الهيئة العامة للضرائب
...Show More Authors

  Tax state institution regards as one of the largest state institutions implementing the tax rules issuing be legislative body and achieving the goals of tax (financial, economic, social and political). So, the tax management should pay attention to the procedures enabling it to achieve those rules starting from the procedures of tax restrict and ending by tax allocation where the process of assessment the taxation must relaxing on modern methods. The problem of the study raising from that in spite of there is a low  obliging the taxable person (registered or not) to submit a declaration about his income and the achieved profit to be the base of taxation˒ where the other ways  are secondary ways helping in rejection of tax declaration, the scientific application becomes contravention of the law where  the tax declaration and its procedures transform to a secondary method effecting the tax obligation negatively and leading to the expansion of tax evasion beside that the is weakness in the procedures of taxation and in following up by the units which in charge of their achievement  all this lead us to the following question! Are the adopted procedures of taxation of true income and its resources achieved their role to restrict the tax erosion?  So, this study aims at shading the light on the theoretical framework of the tax declaration adopting in the tax state institution and its place among the different assessment methods, discussing the procedures of taxation depending on the income tax low, their abilities in retracting the tax evasion and the level of implementing of them by the responsible units, observing the weakness points, clearing the indicators of assessment and putting the solutions to treat them. The result of this study show that there are some weakness points in the procedures of taxation adopting by the responsible units in implementing them in the brings of the institution and in the process of following up by the department of vocational  and merchandise works. The study concludes some of suggestions basing on the scientific and theoretical conclusions among of them focusing on suitability of the tax procedure and don’t depending on the traditional desk inspection but trying to widen its field to include observation of the taxable person's records in their places of work .                                                                                                                           

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
College Of Islamic Sciences
Verses of cheerfulness and fluency of the face in the Holy Qur’an: An Objective Study
...Show More Authors

Most of us are tired of the circumstances that surround us because of their deficiency, deprivation, and sullenness, even though troubles and pains are the soil in which the seeds of strong personality  sprout.             

   The content of the research is summed up in the fact that there is no need to frown, so let our face be free, and our word good and tolerant, so that we can be the most loving people of those who give them, and the Messenger of God (may God’s prayers and peace be upon him and his family) was known to be the heaviest  concerns  of people, but he was most smiling of people, by smiling, we buy lives, so we should get used to it, because that gives us hope and finds the world in our hands, an

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Preservation of the mind and its development Makassedi study in the light of prayers Almathur
...Show More Authors

A great abbey in the Shari'a, and is therefore destined to be preserved in many texts and by methods
There are many prayers in the Qur'an and Sunnah to encourage them
They have a clear relationship with the preservation of the purposes of the Sharia in general, and with a purpose
Save the mind in particular, but the scholars - the mercy of God - when they declare that the costs of Sharia
Due to the preservation of my intentions in the creature, they limit their words to orders and intentions, and are not exposed
In particular,
If they were included in the texts of the Shariah and Tawjiyatiya,
To be related to the preservation of the purposes of the law, which confirms the words of the former leaders, and light the li

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Robust Estimation For Location Parameter
...Show More Authors

 In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Construction Bullying scale for Kindergarten child
...Show More Authors

Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref