Preferred Language
Articles
/
jpgiafs-75
Survey theopinions professional and academics on building the strategy of internal audit function and the possibility of keeping abreast of developments
...Show More Authors

The research problem is clearly deficient suffered by the internal audit function in all institutions of Iraq, as a result of the lack of sponsor organizations for this profession and there is no law or local legislation determine its powers and its responsibilities and scope of work As well as the lack of interest of senior management in economic units that function, as it focuses its work on the scope of financial and accounting matters only So required to rebuild this function in line with the current developments as well as the lack of a framework that defines the strategy of this function, and it came the idea of research to find out how to create a regulatory method for re-strategic construction of the internal audit function depending on the standards internal IIA InstituteAnd taking into account a framework COSO and COBIT, and Sarbanes-Oxley Act,surveyed a sample of accountants, academics and professionals working in the sector, states and the private sector and the views of auditors as well as members of the boards of some companies in Iraq, about the status of a proposed framework for the internal audit function.

Crossref
View Publication
Publication Date
Wed Sep 26 2018
Journal Name
International Research Journal Of Pharmacy
DENTAL PHARMACOLOGICAL KNOWLEDGE AMONG IRAQI MOTHERS AND ITS IMPACT ON THEIR CHILDREN
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Consumer Subjective Values and their Reflection on Fashion Design: وسن خليل إبراهيم
...Show More Authors

This paper deals with the subjective reflections of consumer values ​​on fashion design. The   consumer self is determined by the consumer's idea of ​​himself, according to the intellectual, spiritual and social values, and these values ​​take their intellectual reflection in the form of material values ​​that the consumer finds in fashion design. These values ​​are based on considerations between what is intellectual represented by the values ​​of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The   consumer self gets its material image represented in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Content Based Image Retrieval Based on Feature Fusion and Support Vector Machine
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Nψβ and Nβψ - Closed sets in Neutrosophic Topological spaces
...Show More Authors

The aim of this paper is to introduce the concept of N  and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation
...Show More Authors

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 02 2016
Journal Name
World Journal Of Pharmaceutical Research
HISTOGENESIS AND HISTOMORPHOMETRIC STUDY ON KIDNEY DISORDER BY LAMOTRIGINE IN POSTNATAL RAT
...Show More Authors

Background: Lamotrigine is a second generation Anti-epileptic drug; it is widely used for the treatment of epilepsy and bipolar disorder. Sufficient data is not available concerning its teratogenicity. Aim of the study: The study has been carried out to evaluate the effect of lamotrigine on Rat kidney development. Materials and Methods: The study was conducted on 10 pregnant Albino Rats (Rattus rattus) divided equally into two groups, control and experiment groups. Experiment group received lamotrigne 10mg/kg/day orally using naso-gastric tube from the first day of gestation until the first week after birth, while the control group received distilled water. Newborn kidneys were collected at day 7 postnatal and fixated in bouin’s solution,

... Show More
Publication Date
Tue Jun 14 2022
Journal Name
Iraqi Journal Of Industrial Research
Biofuel Production and Its Impact on Global Food Security: A Review Article
...Show More Authors

The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More