The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income tax are natural persons or legal persons (companies), as information technology contributes to the provision of accurate and reliable information in a timely manner.
The research seeks to identify the contemporary events that face the use of electronic payment methods to localize the salaries of state employees and its impact in enhancing the mental image of customers, and to achieve this purpose from the fact that a questionnaire was designed and distributed to an optional sample of (31) individual customers (employees) dealing With the researched private banks, it has been analyzed and reached a number of conclusions and recommendations, the most prominent of which is the lack of modernity of electronic payment methods by customers, which is reflected in the mental image of customers and the achievement of their satisfaction, in the Emiratization project for salaries needs an advanced leade
... Show MoreIn this research is to study the influence of the aging heat treatment on the pitting corrosion resistance of martensitic stainless steel (MSS), where a number of specimens from martensitic stainless steel were subjected to solution treatment at 1100 oC for one hour followed by water quenching then aging in the temperatures range (500-750) oC for different holding times (1,5,10,15&20) hr. Accelerated chemical corrosion test and immersion chemical corrosion test were performed on samples after heat treatment. The results of the research showed that the pitting corrosion resistance is significantly affected by the aging temperature. Where found that the aging samples at a temperature of 500 °C have the highest ra
... Show MoreIn this research a study process to calculate the factor accumulation of gamma rays for aluminum and exporters cobalt 60 Mika Atktron volts and actively radiation Vdrh 1.406 Mika Bq been studying the effect of the angle of reimbursement and the distance between the shield and detector In measurements factor accumulation Adhrt results in line with the theoretical results published
Moisture damage is a primary mode of distress occurring in hot mix asphalt (HMA) pavements in Iraq. Because of the loss of bond, or stripping, caused by the presence of moisture between the asphalt and aggregate, which is a problem in some areas and can be severe in some cases, it is requires to evaluate the design asphalt mixture to moisture susceptibility. Many factors such as aggregate characteristics, asphalt characteristics, environment, traffic, construction practices and drainage can contribute to stripping. Asphalt concrete mixes were prepared at their optimum asphalt content by superpave system and then tested to evaluate their engineering properties, which include tensile strength, resilient modulus, and perman
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreObjectives: To evaluate the effect of non-pharmacological pain relief methods on duration of labor stage.
Methodology: A quasi-experimental study design was conducted during the period of (4th July 2018 through 24th October 2018) on non-probability of (60) women (30) of them were a control group and (30) were the study group whom admitted to Al-Elwyia Maternity Teaching Hospital suffering from labor pain. A questionnaire was used as a tool of data collection Descriptive& Inferential statistical analyses were used to analyze the data.
Result: The highest percentages of study and control groups were in age group (< 20) years old, primary schools graduates, housewife, from "urban area", within low category of socioeconomic scal
Abstract
The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users of financial statements who depend on reported earnings in their deci
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called