Preferred Language
Articles
/
jpgiafs-409
Evaluation the Procedure for Recognition of Income Tax to Reduce Tax Evasion: بحث تطبيقي في الهيئة العامة للضرائب
...Show More Authors

  Tax state institution regards as one of the largest state institutions implementing the tax rules issuing be legislative body and achieving the goals of tax (financial, economic, social and political). So, the tax management should pay attention to the procedures enabling it to achieve those rules starting from the procedures of tax restrict and ending by tax allocation where the process of assessment the taxation must relaxing on modern methods. The problem of the study raising from that in spite of there is a low  obliging the taxable person (registered or not) to submit a declaration about his income and the achieved profit to be the base of taxation˒ where the other ways  are secondary ways helping in rejection of tax declaration, the scientific application becomes contravention of the law where  the tax declaration and its procedures transform to a secondary method effecting the tax obligation negatively and leading to the expansion of tax evasion beside that the is weakness in the procedures of taxation and in following up by the units which in charge of their achievement  all this lead us to the following question! Are the adopted procedures of taxation of true income and its resources achieved their role to restrict the tax erosion?  So, this study aims at shading the light on the theoretical framework of the tax declaration adopting in the tax state institution and its place among the different assessment methods, discussing the procedures of taxation depending on the income tax low, their abilities in retracting the tax evasion and the level of implementing of them by the responsible units, observing the weakness points, clearing the indicators of assessment and putting the solutions to treat them. The result of this study show that there are some weakness points in the procedures of taxation adopting by the responsible units in implementing them in the brings of the institution and in the process of following up by the department of vocational  and merchandise works. The study concludes some of suggestions basing on the scientific and theoretical conclusions among of them focusing on suitability of the tax procedure and don’t depending on the traditional desk inspection but trying to widen its field to include observation of the taxable person's records in their places of work .                                                                                                                           

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 07 2018
Journal Name
International Journal Of Applied Pharmaceutics
FORMULATION AND CHARACTERIZATION OF LAFUTIDINE NANOSUSPENSION FOR ORAL DRUG DELIVERY SYSTEM
...Show More Authors

Objective: The objective of this study was to prepare nanosuspension of a practical water insoluble antiulcer drug which is lafutidine to enhance the solubility, dissolution rate with studying the effect of different formulation variables to obtain the best formula with appropriate physical properties and higher dissolution rate.Methods: Nanosuspension of lafutidine was prepared using solvent anti-solvent precipitation method using Polyvinylpyrrolidone K-90(PVP K-90) as the stabilizer. Ten formulations were prepared to show the effect of different variables in which two formulations showed the effect of stabilizer type, three formulations showed the effect of stabilizer concentration, two formulations showed the effect of combinatio

... Show More
View Publication
Scopus (26)
Crossref (14)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Integrated Approach for Management OF Supply chain and relationship with MRP
...Show More Authors

 

Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.

Research depend on quantitative and descriptive method, It

... Show More
View Publication
Crossref
Publication Date
Wed Sep 18 2024
Journal Name
Karbala International Journal Of Modern Science
Synthesis of ZnO: ZrO2 Nanocomposites Using Green Method for Medical Applications
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Implementation of hierarchically porous zeolite-polymer membrane for Chromium ions removal
...Show More Authors
Abstract<p>This work deals with the preparation of a zeolite/polymer flat sheet membrane with hierarchical porosity and ion-exchange properties. The performance of the prepared membrane was examined by the removal of chromium ions from simulated wastewater. A NaY zeolite (crystal size of 745.8 nm) was prepared by conventional hydrothermal treatment and fabricated with polyethersulfone (15% PES) in dimethylformamide (DMF) to obtain an ion-exchange ultrafiltration membrane. The permeate flux was enhanced by increasing the zeolite content within the membrane texture indicating increasing the hydrophilicity of the prepared membranes and constructing a hierarchically porous system. A membrane contain</p> ... Show More
View Publication
Scopus (28)
Crossref (17)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
A New Iterative Methods For a Family of Asymptotically Severe Mappings
...Show More Authors
Abstract<p>The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 25 2022
Journal Name
Tem Journal
Preparing of ECG Dataset for Biometric ID Identification with Creative Techniques
...Show More Authors

The Electrocardiogram records the heart's electrical signals. It is a practice; a painless diagnostic procedure used to rapidly diagnose and monitor heart problems. The ECG is an easy, noninvasive method for diagnosing various common heart conditions. Due to its unique advantages that other humans do not share, in addition to the fact that the heart's electrical activity may be easily detected from the body's surface, security is another area of concern. On this basis, it has become apparent that there are essential steps of pre-processing to deal with data of an electrical nature, signals, and prepare them for use in Biometric systems. Since it depends on the structure and function of the heart, it can be utilized as a biometric attribute

... Show More
View Publication
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Characteristics measurement of Baghdad University radio telescope for hydrogen emission line
...Show More Authors

The aim of this paper is to measure the characteristics properties of 3 m radio telescope that installed inside Baghdad University campus. The measurements of this study cover some of the fundamental parameters at 1.42 GHz. These parameters concentrated principally on, the system noise temperature, signal to noise ratio and sensitivity, half power beam width, aperture efficiency, and effective area. These parameters are estimated via different radio sources observation like Cas-A, full moon, sky background, and solar drift scan observations. From the results of these observations, these parameters are found to be approximately 64 K, 1.2, 0.9 Jansky, 3.7°, 0.54, and 3.8 m2 respectively. The parameters values have vital affect to quantitativ

... Show More
View Publication
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2016
Journal Name
2016 Ieee Symposium Series On Computational Intelligence (ssci)
A fusion of time-domain descriptors for improved myoelectric hand control
...Show More Authors

View Publication
Scopus (37)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (42)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (5)
Crossref