The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income tax are natural persons or legal persons (companies), as information technology contributes to the provision of accurate and reliable information in a timely manner.
One of the troublesome duties in chemical industrial units is determining the instantaneous drop size distribution, which is created between two immiscible liquids within such units. In this work a complete system for measuring instantaneous droplet size is constructed. It consists of laser detection system (1mW He-Ne laser), drop generation system (turbine mixer unit), and microphotography system. Two immiscible liquids, water and kerosene were mixed together with different low volume fractions (0.0025, 0.02) of kerosene (as a dispersed phase) in water (as a continuous phase). The experiments were carried out at different rotational speed (1180- 2090 r.p.m) of the turbine mixer. The Sauter mean diameter of the drops was determined by la
... Show MoreDynamic Thermal Management (DTM) emerged as a solution to address the reliability challenges with thermal hotspots and unbalanced temperatures. DTM efficiency is highly affected by the accuracy of the temperature information presented to the DTM manager. This work aims to investigate the effect of inaccuracy caused by the deep sub-micron (DSM) noise during the transmission of temperature information to the manager on DTM efficiency. A simulation framework has been developed and results show up to 38% DTM performance degradation and 18% unattended cycles in emergency temperature under DSM noise. The finding highlights the importance of further research in providing reliable on-chip data transmission in DTM application.
The optimum design is characterized by structural concrete components that can sustain loads well beyond the yielding stage. This is often accomplished by a fulfilled ductility index, which is greatly influenced by the arrangement of the shear reinforcement. The current study investigates the impact of the shear reinforcement arrangement on the structural response of the deep beams using a variety of parameters, including the type of shear reinforcement, the number of lacing bars, and the lacing arrangement pattern. It was found that lacing reinforcement, as opposed to vertical stirrups, enhanced the overall structural response of deep beams, as evidenced by test results showing increases in ultimate loads, yielding, and cracking of
... Show MoreThe current study examined the effect of different sample sizes to detect the Item differential functioning (DIF). The study has used three different sizes of the samples (300, 500, 1000), as well as to test a component of twenty polytomous items, where each item has five categories. They were used Graded Response Model as a single polytomous item response theory model to estimate items and individuals’ parameters. The study has used the Mantel-Haenszel (MH) way to detect (DIF) through each case for the different samples. The results of the study showed the inverse relationship between the sample size and the number of items, which showed a differential performer.
In this research study, I tried to trace the epic effect to learn how it was understood and how it was used. Following the descriptive and analytical approach in the research, the first chapter dealt with a presentation of the methodological framework of the problem, the goal, the limits of the research, the importance and the need for it and the definition of terms, as well as the theoretical framework which consisted of two topics, including the impact of the epic theater on the world theater and the second the effect of the epic theater on the Arab theater, This came by tracing the epic impact on the world stage of the Greeks, the Middle Ages, the Renaissance, and the Arab theater of the twentieth century.
As for the second
The financial statements must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74) 2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2 concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision at a rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years .also from the significance of the issue of real estates that become a property of banks as a result of debt settlement and the pr
... Show MoreThe aims of research is to know the effect of using the computer in
teaching physics to the fifth secondary grade on the achievement of the students and their retention of information .
The sample consists of ( 50 ) students in the fillh secondary grade (scicnti fie branch ) in Nassiriyah secondary school in Thi-qar governorate in ( 200 I - 2002 ) that chooses as random Iy and divided
to t>vo equivalent groups:control and experimental .
The researcher built the teaching plans of each group . The five lessons choice from curriculum , and desi b'Tl five computer teaching programs , and final achievement test from multip
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreMany studies dealt with the consequences of SARS CoV-2 (which cause COVID-19 infection) on the nervous system especially sensory nerves where the virus causes loss of taste and smell as it’s known, and may affect auditory nerves and be the expected cause of some hearing problems. A case-control analytic study was performed on a connivance sample of society of university students from a medical faculty. Each participant filled out a questionnaire contains demographic data and general, auditory and respiratory health condition, in addition to vaccination status. In the other side, the audio- examinations were performed on the study sample including Pure Tone Audiometry (PTA) and tympanometry. Two statistical methods; chi-square and t
... Show More