Tax state institution regards as one of the largest state institutions implementing the tax rules issuing be legislative body and achieving the goals of tax (financial, economic, social and political). So, the tax management should pay attention to the procedures enabling it to achieve those rules starting from the procedures of tax restrict and ending by tax allocation where the process of assessment the taxation must relaxing on modern methods. The problem of the study raising from that in spite of there is a low obliging the taxable person (registered or not) to submit a declaration about his income and the achieved profit to be the base of taxation˒ where the other ways are secondary ways helping in rejection of tax declaration, the scientific application becomes contravention of the law where the tax declaration and its procedures transform to a secondary method effecting the tax obligation negatively and leading to the expansion of tax evasion beside that the is weakness in the procedures of taxation and in following up by the units which in charge of their achievement all this lead us to the following question! Are the adopted procedures of taxation of true income and its resources achieved their role to restrict the tax erosion? So, this study aims at shading the light on the theoretical framework of the tax declaration adopting in the tax state institution and its place among the different assessment methods, discussing the procedures of taxation depending on the income tax low, their abilities in retracting the tax evasion and the level of implementing of them by the responsible units, observing the weakness points, clearing the indicators of assessment and putting the solutions to treat them. The result of this study show that there are some weakness points in the procedures of taxation adopting by the responsible units in implementing them in the brings of the institution and in the process of following up by the department of vocational and merchandise works. The study concludes some of suggestions basing on the scientific and theoretical conclusions among of them focusing on suitability of the tax procedure and don’t depending on the traditional desk inspection but trying to widen its field to include observation of the taxable person's records in their places of work .
Bacterial water pollution is a genuine general wellbeing concern since it causes various maladies. Antimicrobial nanofibers can be integrated by incorporating nanobiocides, for example, silver nanoparticles into nanofibers. Nylon 6 was dissolved in formic acid at a concentration of (25 wt. %) and tough antibacterial (AgNO3/Nylon) nanofibers were produced utilizing electrospinning system. Polymer solution was tested before accomplishing electrospinning process to acquire its surface tension, electric conductivity and viscosity, where every one of those parameters increased relatively with increasing concentration of (AgNO3) additions. SEM and EDX spectra were utilized to focus on the morphology, surface elemental mem
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
على الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.
ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information
... Show MoreChekhov is well known and perceived in Arab countries. His stories and plays are very popular. They translated it into Arabic by different translators from different languages of the world Many of his stories require new translation solutions to achieve partial, if not complete, equivalence. Chekhov's works are a very difficult subject to analyze and interpret, which is explained by the fact that Chekhov's collections are constantly republished in foreign languages. It is impossible to preserve in translation all the elements of the original text containing historical and national details but, of course, the reader should have the impression that they represent the historical and national situation. When translating, it makes sense to prese
... Show Moreتتركز مشكلة البحث في ضعف كثير من المربين معلمين كانوا أو مدرسين في التعامل مع أخطاء المتعلمين في ضوء السنة النبوية مما يؤدي إلى تعلم غير منتظم، ومن أهم أسباب هذه المشكلة قلة الإطلاع على الأساليب العملية التي ينبغي أن يتعامل بها المربي مع أخطاء المتعلمين، ولا سيما الأساليب المستمدة من القرآن الكريم والسنة النبوية، وهذا ما لمسه الباحث واقعاً من خلال ممارسته لعملتي التعليم والتدريس لمدة خمس عشرة سنة، ومن خ
... Show Moreدراسة حاكمية الجامعات وأثرها في القرار الاستراتيجي
تناول البحث دراسة خمسة نصوص مسمارية لقروض غير منشورة من سلالة أور الثالثة وتحليلها وترجمتها وهي من مجموعة المتحف العراقي, يعود تاريخها الى زمن سلالة أور الثالثة (2012-2004ق.م) تحديدا الى زمن الملكين شوسين (2037- 2029ق.م) وابي سين (2028-2004 ق.م), اما مضامينها فهي قروض بمادتي الشعير(ثلاثة نصوص) الفضة (نصان), والقروض على نوعين قروض بفائدة (ur5 - ra), وقروض بدون فائدة (maš2 - nu - tuk), وقد حددت نسبة الفائدة في القروض 1/3 33% لمادة الشعير و20% لما
... Show More