The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income tax are natural persons or legal persons (companies), as information technology contributes to the provision of accurate and reliable information in a timely manner.
For a long time, the intensification of profit represented a major goal for the company management ,but this goal confirmed a series of restrictions such the constriction on short period, the time rather than on long and medium strategic goal, the relationships with customers ,the supplies, employees , This goal is replaced by another one (intensification of the company's value) ,and the fortune of the share holders itself ,for the purpose of creating value, the company must generate great outcomes to cover the operating expense and to insure the a suitable compensation to the invested capital (the market value added) is the indication used to estimate the company ability to create value –added the development
... Show MoreIn this search, Ep/SiO2 at (3, 6, 9, 12 %) composites is prepared by hand Lay-up method, to measure the change in the thermal conductivity and Impact Strength of epoxy resin before and after immersion in H2SO4 Solution with a 0.3N for 10 days. The results before immersion decreases with the increase of the weight ratios of the reinforcement material (SiO2), It changed from (82.6×10-2 to 38.7×10-2 W/m.°C) with change weight ratios from (3 to 12) % respectively, but after immersion time in the chemical solution where it was (65.6×10-2 W/m.°C) at the weight ratios (6 %) and became (46.6 × 10-2 W/m.°C) after immersion in sulfuric acid. The results of the Impact strength decreased by increasing the percentage weight ratio, it changed f
... Show MoreThe aim of this study was to study TV advertising and consumer behavior in children and to meet the needs of children. The study included 100 children from Baghdad who were randomly selected from different regions ranging in age from 9-12 years of both males and females. The current research was based on the interview and the completion of special forms prepared for this purpose. This age group was selected for the rare studies conducted on television advertising and limited to different sectors. Data on age and sex were documented, as the results of this study proved The afternoon period was the preferred period for watching the TV show in males, where it was 22%, while the morning period was the female favorite, and it was 23%. The ind
... Show MoreBackground: Ruptured posterior communicating artery (PCoA) aneurysms are common; they usually present with subarachnoid haemorrhage (SAH) and oculomotor nerve palsy. The aneurysmal dome projection may influence the safety access and aneurysmal neck clipping. Here, we discuss additional intraoperative steps that may be required to widen the surgical field to ensure safe surgical clipping of a rupture pure posteriorly directed PCoA aneurysm. Case description: A previously healthy 38-year-old male reported sudden severe headache and disturbed level of consciousness with a Glasgow coma scale (GCS) of 13. His initial computed tomography (CT) scan of the head showed SAH in the basal cistern. 3D-constructed CT angiography (CTA) revealed a
... Show MoreBackground: There is a pronounced controversy regarding the dental and mental consequences of thumb sucking habit, which is a familiar nonnutritive pattern of sucking. Commonly, this behavior is harmless, yet those who sustain this pattern may have dental alterations and emotional difficulties. Children’s intelligence level influences their capabilities to judge, evaluate and handle priorities and/or problems profoundly and precisely. Thumb sucking habit might be a manner of liberating the psychological tenseness among several children. Objective: The purpose of this study is to assess the prevalence of thumb sucking habit and its relation to the eruption of permanent teeth and IQ among children aged 6-7 years old. Subjects and methods: I
... Show MoreThe current research aims to identify the " impact of strategic warheads numbered ( NHT) in the collection average second grade students in the article of history). " To achieve this, I assumed the researcher that there is no different between the statistically significant the average score for the collection of experimental group who teaches the Arab Islamic history on and a strategic warheads numbered and the average score for the collection of the control group who were studying the same article according to the classic method ( traditional) . The study sample consisted of 64 students from the second grade average in the secondary warka bin nawfal in the general Directorate for education first karkh in Baghdad for the annual cources 2
... Show MoreThe present study aims to reveal the extent of the influence of the acquired organizational immune through its dimensions (organizational vaccination, organizational learning, organizational memory, and benchmarking) in the application of knowledge management strategies in its two dimensions (codification strategy, personalization strategy) as well as clarifying that influential relationship between the study variables Because of its importance in reducing resistance to change by responding to the requirements of the environment. A set of main and sub-hypotheses emerged from the study, which was formulated in view of the hypothesis scheme of the study, and i
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe research topic dealt with the strategic recovery of the insurance service, which is one of the approaches that have an important role in providing solutions and remedies for the recession that affects companies and hinders them from achieving their strategic goals. The research also addressed the strategic objectives of the company as the rationale and actual guide for companies of all activities in order to protect their systems from deviation for its desired purpose. So the aim of the research is to demonstrate the repercussions of the strategic recovery of the insurance Service represented by (compensation, speed of response, apology, initiative (identifying the problem). The company's strategic goals are represented (prof
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More