Preferred Language
Articles
/
jpgiafs-991
Strategic tax planning and its impact on reducing tax evasion
...Show More Authors

Taxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives, and the research problem is summarized in the extent to which the tax system follows the strategic planning of taxes in order to achieve the tax objectives and the effectiveness of this planning (strategic planning) in reducing tax evasion, and therefore the research sample was taken to include (specialists, workers, and taxpayers) and it was The sample is 105 individuals, and accordingly the study came out with results, the most important of which are; The importance of strategic planning in relation to reducing tax evasion, the existence of a weak correlation that is close to being of medium strength with a statistical significance between strategic planning and its importance in reducing tax evasion reflects the lack of interest of the sample in question in strategic planning, there was a significant statistically significant effect between strategic planning For taxes and the reduction of tax evasion, the decrease in the relative importance of taxes in general for the state, especially in the financing aspect, if, during the past 15 years, its contribution to the state’s general budget did not reach 4%, which is less than a shy percentage. The increase in tax revenues is an unreal increase, as it is As a result of the increase in government spending and the increase in inflation rates.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
The Effect of Potassium Sorbate on Microorganism and Self life of Laboratory Biscuit
...Show More Authors

This study has been conducted to examin the effect of potassium sorbate at different level of 0.03,0.06,0.10% on the number of bacteria and mold and to extend the storage life of laboratory processed biscuit. The results indicated that the use of 0.03% potassium sorbate prolonged the storage peroid until the third month .three types of bacteria has been isolated from processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli using 0.06% potassium sorbate showed no growth of bacteria up to six month of storage ,while using of 0.03% and 0.06% potassium sorbate prevent the growth of mold up to three and six months of storage respectively. Both Aspergillus and Penicillium were isolated from the processed biscuit.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Physical Mesomechanics Of Condensed Matter: Physical Principles Of Multiscale Structure Formation And The Mechanisms Of Nonlinear Behavior: Meso2022
Effect of L-cysteine capping the CdSe, CdSe:CdS on structural and morphological properties
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Craniofacial Surgery
Effect of Platelet-Rich Fibrin and Bone Morphogenetic Protein on Dental Implant Stability
...Show More Authors

Abstract: Recombinant human bone morphogenetic protein-2 (rhBMP-2) and platelet-rich fibrin (PRF) bioactive materials have been used to enhance healing and improve dental implant stability. This study aimed to compare the effect of rhBMP-2 and PRF bioactive materials on dental implant stability at different intervals and to evaluate the correlation of implant length and diameter with implant stability. Two bioactive materials were compared to evaluate their effect on dental implant stability. A total of 32 patients (102 dental implants) were divided into 3 groups: 24 dental implants with bone morphogenetic protein (BMP), 27 dental implants with PRF, and 51 dental implants without BMP or PRF (control group). Data were statistically analyzed

... Show More
View Publication
Scopus (17)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Culture Consumption in an Increase of Deception Marketing , a Sample Survey of Cosmetic Users Employees College of Administration & Economics / University of Mosul
...Show More Authors

Economics / University of Mosul

 

Abstract

The spread of the phenomenon of excessive buying in our society, especially for cosmetics, and at the same time increase the marketing deception by the organizations to take quick profit 'and accordingly was identified the problem of research in several questions, including:

Is there a significant effect of consumption culture on marketing deception?                                                &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The semantics of terms in terms of inclusiveness when Imam Ibn Hajar al-Askalani (d. 852 e) in his book Fath al-Bari: Door of worship - Practical models
...Show More Authors

Praise be to Allaah.
My research has included the following: The field of application of semantics when fundamentalists are the book and the Sunnah. Imam Ibn Hajar agreed with the majority of fundamentalists that what is meant from the year (one word denotes one side on two things onwards), and agreed that the significance of the year specific to the rest of its members is not a definite and definite formulas of the public has the singular known as (the) Astragharism, and the plural known as ( The nationality stating that dumping, pluralism is defined as (add), and nakra, if it occurs in the context of the condition, denial and prohibition, the names of the condition, the connected names, and the word (all - all). And the year in whic

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
مجلة الدراسات الاقتصادية والادارية
Measuring readiness to accomplish organizational change through personal characteristics: Crisis management approach: An exploratory study of the opinions of a sample of managers at Central Technical
...Show More Authors

The self-evident truth existing in today's business environment is the continuity of change and its continuity and turmoil, also its increase over time as it is more abundant, abundant, wide and complex than ever before, and it is the dominant feature in the business environment, as different organizations and operating units can find themselves shifting from the top to the bottom. And then it requires its departments to strive to adapt to these rapid and turbulent shifts and changes by bringing about a series of organizational and adaptive changes that are not limited to one organizational aspect only but rather include all organizational components. Accordingly, this research came to determine the readiness of public organizations to chan

... Show More
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology Journal
The Effect of Re-Use of Lossy JPEG Compression Algorithm on the Quality of Satellite Image
...Show More Authors

In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.

View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
The Skills of Intended Meaning behind the Context when Reading Poetry among Fifth Grade Students- Literary Branch from Teachers’ Perspectives
...Show More Authors

        The current research aims to investigate the skills of the intended meaning beyond the context when reading poetry among fifth literary students. To achieve the aim of the research, the researcher has followed the descriptive approach and used two tools: an open questionnaire that includes an inquiry about the skills of the intended meaning beyond the poetic context, and a closed questionnaire that were examined by the juries, and modified accordingly. Besides, its validity and stability were examined by applying the study on an exploratory sample of (15) teachers to reach its final version and determine the time required to answer it. Then, the researcher applied it on the research sample of (9

... Show More
View Publication Preview PDF
Crossref