Many financial institutions invest their surplus funds in stocks, either to obtain dividends or for trading purposes and to obtain profits from the difference between the cost and the selling price, and investment in shares represents an important part of the financial position of financial institutions applying to the common accounting system of banks and insurance companies, in addition to their impact It is clear on the result of the activity of these institutions.The aim of the research is to define what the shares and their types are, and to indicate the accounting treatments needed to move towards the process of adopting the International Financial Reporting Standard No. (9) and its reflection on its financial statements. Its activity and the researchers recommended the need to adopt the International Financial Reporting Standard No. (9) to hold companies accountable, especially that their current book values Do not reflect current market indicators.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Gotu Kola (Centella asiatica) has been used as a traditional medicine for many years to cure different kinds of diseases. Studies have been reported that Gotu Kola extracts might be used as a cure for oral diseases such as periodontal disease. In the present study, Gotu Kola leaves extracted with water will be used to evaluate its effect on some microorganisms living in the human saliva using minimum inhibitory concentration (MIC) method. Material and Method:Gotu Kola fresh leaves extract have been used with water as a solvent, a rotary evaporator was used to separate the solvent from the extract. The following microorganisms: Streptococci, Lactobacilli, and Staphylococcus aureus have been isolated fromthe Saliva of ten voluntee
... Show MoreThe objective of this research is to study the possibility of reducing the reflectivity of the front surface of a silicon cell (Si / Si) by using a theoretical design for a single-layer Antireflection Coatings with a thickness of one quarter of the design wavelength. Then, Mathematical programs in MATLAB (10) were designed to study the quantitative efficiency of the cell as a function of the change in the particle size of the coating within the range (400 - 700 nm) wavelength of the visible state of the vertical and oblique state at the (45°) angle. (Ge) was used as an anti-reflective material. It was found that the highest quantitative efficiency was (96.9004%) at design wavelength (λ0= 550 nm)
... Show MoreDensity Functional Theory (DFT) at the B3LYP/ 6-311G basis set level and
semiemperical methods (PM3, AM1, and MINDO/3) were performed on six new
substituted Schiff bases derivatives of INHC (N-(3-(phenylidene-allylidene)
isonicotinohydrazide) using Gaussian-03 program. The calculated quantum chemical
parameters correlated to the inhibition efficiency were studied and discussed at their
equilibrium geometry and their correct symmetry (Cs). Comparisons of the order of
inhibition efficiency of the Schiff bases derivatives, and local electrophilic and
nucleophilic reactivity have analyzed. Some physical properties also were studied
such as heat of formation, total energy and dipole moment...etc. Also vibration
freq
In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transfo
... Show MoreColour is part of human environ ment and is present almost every
where in cluding clothes.
Clours have positive and negative effects on the person's psychology.
Thus we can ask the following question: what are the clours preffered
by the Iraqi females in the university level and what is the lightness and purity
of these colours and their effect on their psychology?
In this research we included 563 Baghdad university female student for
the year 2005-2006.
The question are included anumber of qnestions that gave answers to
the research main objectives.
The geochemical study of the Oligocene-Miocene succession Anah, Euphrates, and Fatha formations, western Iraq, was carried out to discriminate their depositional environments. Different major and trace patterns were observed between these formations. The major elements (Ca, Mg, Fe, Mn, K, and Na) and trace elements (Li, V, Cr, Co, Ni, Cu, Zn, Ga, Rb, Sr, Zr, Cs, Ba, Hf, W, Pb, Th, and U) are a function of the setting of the depositional environments. The reefal facies have lower concentrations of MgO, Li, Cr, Co, Ni, Ga, Rb, Zr, and Ba than marine and lagoonal facies but have higher concentrations of CaO, V, and Sr than it. Whereas dolomitic limestone facies are enriched V, and U while depletion in Li, Cr, Ni, Ga, Rb, Sr, Zr, Ba, an
... Show More