Preferred Language
Articles
/
jpgiafs-526
Suggested Model for The Work of the Certified Fraud Examiner & His Role in Reducing The Incidents of Fraud and Corruption: An Applied Study in The Federal Board of Supreme Audit
...Show More Authors

Is hardly day expire without hearing the news either Abuse Managementthe accounting standards or the existence of serious misstatements by someauditors.Which caused the demanding of many companies in the recent republication of the financial statements and the re-announcement of its financialresults. Such acts raise questioning about the role that should be played by theauditors, prompting agencies responsible for setting auditing standards to takeTo throw increasingly responsibility on the auditors in order to interest risksfraud The Risks of Fraud in their review of the financial statements.also The Public Company Accounting Oversight Board in the U.S.called about the need of owning the Certified Public Accountants those whoaudits for powerful skills in the field of Certified fraud examination, but theserequirements raises a new question, namely! From Where we will bring thoseauditors who have the skills of fraud examination ،This research on the amodel application to the work of the legal examiner in the Office of the FederalFinancial Supervisory being the supreme audit functions of the fight againstfraud and corruption institution to maintain the misuse of public money andwaste disposal was built.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Iraqi Journal Of Laser
PDF Photodynamic effect of Rose Bengal activated by low-level laser light on S. aureus : Qusay K. Abbas*, Layla M. Hassan
...Show More Authors

Abstract: Background: Staphylococcus aureus is Gram-positive bacteria that lives as a normal flora in living organisms but can be pathogenic to humans. Although a relatively unspectacular, nonmotile coccoid bacterium, S. aureus is a dangerous human pathogen in both community-acquired and nosocomial infections. Due to the increasing emergence of new strains of this antibiotic-resistant bacteria, it has become essential to approach different methods to control this pathogen. One of these methods is the antimicrobial photodynamic inactivation process using a low-level laser, in this paper, the Photodynamic effects of Rose Bengal and LLLL on the virulence factors of S.aureus were evaluated.

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 25 2025
Journal Name
مجلة كلية التربية
A Multi-modal Critical Discourse Analysis of Selected English Political Cartoons تحليل خطابي نقدي متعدد الوسائط لرسوم كاريكاتورية سياسية إنجليزية مختارة
...Show More Authors

This study analyses six political cartoons selected based on their relevance to current Iraqi political issues, specifically the period between 2005 and 2015, from American online newspapers (calgecartooms.com). The selection criteria included the cartoons' satirical elements, visual rhetoric, and their ability to engage with themes such as power dynamics, social issues, and public opinion. It sheds light on how these cartoons can function as mediators of meanings between the cartoonists and the readers. The data is examined using multimodal discourse analysis (MDA), which combines language study with the analysis of other visual elements, like colors, gestures, and images, to understand meaning (O’Halloran et al., 2011). The Visual Socia

... Show More
View Publication
Publication Date
Thu Dec 14 2023
Journal Name
Optical And Quantum Electronics
Enhancing response characteristics of palladium-doped vanadium pentoxide on a porous silicon substrate as gas sensor synthesized by pulsed laser deposition
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Food And Nutrition Sciences
Optimization of Culture Conditions to Produce Phytase from <i>Aspergillus tubingensis SKA</i>
...Show More Authors

The effects of nutrients and physical conditions on phytase production were investigated with a recently isolated strain of Aspergillus tubingensis SKA under solid state fermentation on wheat bran. The nutrient factors investigated included carbon source, nitrogen source, phosphate source and concentration, metal ions (salts) and the physical parameters investigated included inoculum size, pH, temperature and fermentation duration. Our investigations revealed that optimal productivity of phytase was achieved using wheat bran supplemented with: 1.5% glucose. 0.5% (NH4)2SO4, 0.1% sodium phytate. Additionally, optimal physical conditions were 1 × 105 spore/g substrate, initial pH of 5.0, temperature of fermentation 30˚C and fermentation dura

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Determination of Advanced Oxidation Protein Products, E3 SUMO-Protein Ligase NSE2[NSMCE2], as a Marker to Predict Child Acute Lymphoblastic Leukemia
...Show More Authors

Acute lymphoblastic leukemia (ALL) is a cancer of the blood and bone marrow (spongy tissue in the center of bone). In ALL, too many bone marrow stem cells develop into a type of white blood cell called lymphocytes. These abnormal lymphocytes are not able to fight infection very well. The aim of this study was to investigate possible links between E3 SUMO-Protein Ligase NSE2 [NSMCE2] and increase DNA damage in the childhood patients with Acute lymphoblastic leukemia (ALL). Laboratory investigations including hemoglobin(Hb) ,white blood cell (WBC) , serum total protein , albumin ,globulin , in addition to serum total antioxidant activity (TAA) , Advanced oxidation protein products(AOPP) and E3 SUMO-Protein Ligase NSE2[NSMCE2]. Blood samples

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Chemical Engineering Research And Design
Treatment of petroleum refinery wastewater by electrofenton process using a low cost porous graphite air-diffusion cathode with a novel design
...Show More Authors

View Publication
Scopus (26)
Crossref (28)
Scopus Clarivate Crossref