Purpose - The study aimed at evaluating the accounting system of the Iraqi political parties, which is applied according to legislative texts, and then the ability to provide accounting information to evaluate the strategic performance and control of the party's operational and financial performance.
Findings- The research found that the unified accounting system applied to political parties does not provide relevance informations to judge the performance of the political party, the researcher a proposal for an accounting system that provides the necessary information to measure and monitor the performance of Iraqi political parties can be presented. The Proposed Introduction to Activate the Role of Accounting System for Political Parties in Iraq
This is a brief research in which I tried to briefly explain the care that the Holy Qur’an received during the era of the Prophet, may God bless him and grant him peace, from the Prophet, may God bless him and grant him peace, and all of his honorable companions, may God bless him and grant him peace. I made this research in an introduction and two chapters, the first chapter I made it entitled: About the Holy Qur’an, in which I talked about general investigations about the Holy Qur’an, such as the definition of the Holy Qur’an and the difference between it and the hadith Qudsi and the hadith of the Prophet, then I mentioned a part of the virtues of the Holy Qur’an in general and the virtues of some surahs in particular, and th
... Show MoreWorldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreNowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreBackground:-The Modified Alvarado Scoring
System (MASS) has been reported to be a cheap
and quick diagnostic tool in patients with acute
appendicitis. However, differences in diagnostic
accuracy have been observed if the scores were
applied to various populations and clinical settings.
Objectives:- The purpose of this study was to
evaluate the diagnostic value of Modified Alvarado
Scoring System in patients with acute appendicitis
in our setting.
Methods:-one hundre twenty eight patients, were
included in this study, admitted to Al-Kindy
teaching hospital from June 2009 to June 2010.
Patients’ age ranged from 8 to 56 years (21±10)
they were divided into three groups; paediatrics,
child bear
The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε VO.
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreThe purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε VO.