Tax state institution regards as one of the largest state institutions implementing the tax rules issuing be legislative body and achieving the goals of tax (financial, economic, social and political). So, the tax management should pay attention to the procedures enabling it to achieve those rules starting from the procedures of tax restrict and ending by tax allocation where the process of assessment the taxation must relaxing on modern methods. The problem of the study raising from that in spite of there is a low obliging the taxable person (registered or not) to submit a declaration about his income and the achieved profit to be the base of taxation˒ where the other ways are secondary ways helping in rejection of tax declaration, the scientific application becomes contravention of the law where the tax declaration and its procedures transform to a secondary method effecting the tax obligation negatively and leading to the expansion of tax evasion beside that the is weakness in the procedures of taxation and in following up by the units which in charge of their achievement all this lead us to the following question! Are the adopted procedures of taxation of true income and its resources achieved their role to restrict the tax erosion? So, this study aims at shading the light on the theoretical framework of the tax declaration adopting in the tax state institution and its place among the different assessment methods, discussing the procedures of taxation depending on the income tax low, their abilities in retracting the tax evasion and the level of implementing of them by the responsible units, observing the weakness points, clearing the indicators of assessment and putting the solutions to treat them. The result of this study show that there are some weakness points in the procedures of taxation adopting by the responsible units in implementing them in the brings of the institution and in the process of following up by the department of vocational and merchandise works. The study concludes some of suggestions basing on the scientific and theoretical conclusions among of them focusing on suitability of the tax procedure and don’t depending on the traditional desk inspection but trying to widen its field to include observation of the taxable person's records in their places of work .
the electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
This research is concerned with designing and simulating an auto control system for a car provided with obstacle avoidance sensors. This car is able to pass through predefined path an around the detected obstacles, and then come back to the intended path. The IR sensor detects the existence of the obstacle through an assumed range of detection, while the visual sensor (camera) feeds back an image including the path that contains an obstacle, which can be useful for determining the obstacle's length, speed, and direction. According to such information, the controller creates transient away point along the longitudinal axis of the obstacle which is the same as the transverse axis of the simulator path at an assumed distance from the
... Show MoreIn the present study, advanced oxidation process / heterogeneous photocatalytic process (UV/TiO2/Fenton) system was investigated to the treatment of oily wastewater. The present study was conducted to evaluate the effect of hydrogen peroxide concentration H2O2, initial amount of the iron catalyst Fe+2, pH, temperature, amount of TiO2 and the concentration of oil in the wastewater. The removal efficiency for the system UV/TiO2/Fenton at optimal conditions and dosage (H2O2 = 400mg/L, Fe+2 = 40mg/L, pH=5, temperature =30oC, TiO2=75mg/L) for 1000mg/L load was found to be 77%.
Aluminum foil cover around the re
... Show MoreThe aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR.
Health and environmental factors as well as operational difficulties are major challenges facing the development of an anaerobic digestion process. Some of these problems relate to the use of sludge collected from primary and secondary clarifier units in wastewater treatment plants for laboratory purposes.
The present study addresses the preparation of sludge for laboratory purposes by using a mixture that consists of the digested sludge, which is less pathogenic, compared to the collected sludge from the primary or secondary clarifier, and food wastes. The sludge has been tested experimentally for 19 and 32 days under mesophilic conditions. The results show a steady methane production rate from the anaerobic dig
... Show MoreThis work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.
A- The research problem: the research problem which is the garments industry, as a
whole it does not rely on a single system in the sizes of the clothing and the working
companies, see that it is not plausible that the sizes be unificd and consistent in all companies.
The current sizes in the domestic Iraqi markets are not suitable for some females ,on the other
hand the Iraqi industry suffers the lack of a modern standard for some Iraqis female bodies.
B- The Signifiance of the research: lies in the study of the diversity of the human body
sizes and naming them to reflect the desires and requirements of the consumer and try to find
a method to meet their expectations as well as to raise the level of garments industr
Mass transfer was examined at a stationary rectangular copper electrode (cathode) by using the reduction of cupric ions as the electrochemical reaction. The influence of electrolyte temperature (25, 45, and 65 oC), and cupric ions concentration (4, 8, and 12 mM) on mass transfer coefficient were investigated by using limiting current technique. The mass transfer coefficient and hence the Sherwood number was correlated as Sh =
Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.
In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py
... Show More