This research aims to Presented model can be applicable – in the frame of current accounting implementations - to measure environmental effects and disclosure then in the financial statements of economic entities after determined the environmental performance scopes of environmental activities that is works by this entities , because of importance of accounting information which presentation by accounting systems which's effectiveness tool on hand of decision maker about site plans and goals and drawing policies aims protection environment sustainable the represented of naturalism wealth elements . The researcher could be able to application his suggested model which's proof the ability to environmental accounting measurement and disclosure then.
بات الفساد ظاهرة عالمية تهدد المجتمعات وبقائها ، وبدت الانقسامات المجتمعية تتضاعف في البلدان التي ينتشر فيها الفساد بمختلف أنواعه وتسمياته ، حيث استكشفت الدراسة بأن التشريعات الجنائية حرصت على تقرير نظام عقابي خاص لمواجهة جرائم الفساد مما استوجب بنا بيان المظاهر القانونية للفساد السياسي المتمثل بالرشوة الدولية والرشوة الانتخابية لان الفساد لم يعد متعلقا بالجانب الاقتصادي فحسب بل امتد إلى الجوانب الأخرى
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon our master and beloved Muhammad and all his family and companions. As for what follows: The research presented the synonymous and common verbal expressions mentioned in the book Al-Taliq Al-Mughni on Sunan Al-Daraqutni by the scholar Sheikh Shams Al-Haq Muhammad Al-Azeem Abadi
Rights of child in the community crisis Iraqi child model The study aimed to identify the types of violation against children in the Iraqi crisis as well as to develop community coping mechanisms to these violations and promote the rights of the child health psychological , social and legal . the first chapter discusses the research problem and its importance and purpose of the research problem and its importance and purpose of the research and the most important terms in the A- Rights of the child ,B- crisis , chapter 2 rights of the child ensure the historical roots , of children’s rights in the holy quran and the sunnah, and legal rights through the twentieth century and the beginnings of century xx, the se through the twentieth cen
... Show Moreوهدف البحث إلى التعرف على الاوهام الايجابية فضلاً عن التعرف على الفروق في الاوهام الايجابية بين الطالبات على وفق متغير الحالة الاجتماعية (متزوجة – غير متزوجة) والتخصص الدراسي (علمي – انساني) والمرحلة الدراسية (اول- رابع)، تألفت عينة البحث من (120) طالبة من طالبات جامعة بغداد -كلية التربية للبنات وكلية العلوم للبنات، وتم تطبيق مقياس البحث - مقياس (الاوهام الايجابية) وهو (من إعداد الباحثة)، وقد اسفرت نتائج البحث عن:
... Show Moreهدفت الدراسة التعرف على الشفقة بالذات لدى الطلبة فضلا عن التعرف على الفروق في الشفقة بالذات وفق متغيرات : الجنس –التخصص الدراسي – المرحلة الدراسية، تالفت عينة الدراسة من (200) طالب وطالبة موزعين بالتساوي حسب الجنس (ذكور – اناث) والتخصص الدراسي (علمي - انساني) والمرحلة الدراسية ( الاولى - الرابعة )، وبعد تطبيق مقياس الدراسة وتحليل الاجابات احصائيا ، اظهرت النتائج ان الطلبة لديهم شفقة بالذات كما اظهرت النتائج عدم
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem. The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show MoreIn linear regression, an outlier is an observation with large residual. In other words, it is an observation whose dependent-variable value is unusual given its values on the predictor variables. An outlier observation may indicate a data entry error or other problem.
An observation with an extreme value on a predictor variable is a point with high leverage. Leverage is a measure of how far an independent variable deviates from its mean. These leverage points can have an effect on the estimate of regression coefficients.
Robust estimation for regression parameters deals with cases that have very high leverage, and cases that are outliers. Robust estimation is essentially a
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show More