Preferred Language
Articles
/
jpgiafs-996
Sources of income subject to tax in the Iraqi Income Tax Law No.113 of 1982
...Show More Authors

The tax is a financial amount collected from the taxpayer for the account of the public treasury.. and is the cornerstone of the close bond between members of the community and the country in which they live , as income tax is imposed on the profits and revenues achieved by people and often the constitution of most contemporary countries stipulate that the legislator is obligated to determine the sources of revenues and profits subjected to tax. Because the tax has a serious impact on people’s money because it is exposed to that money through direct deduction . Therefore, we note that the applicable income Tax Law stipulated that in order income to be subject to tax , it must be derived from one or more of the income sources stipulated in Article Two of it.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
NEWS COVERAGE OF THE TORTURE SCANDAL OF DETAINEES AT ABU GHRAIB PRISON
...Show More Authors

According to the topics of study, The intensity of the news coverage of the Abu Ghraib scandal and the US soldiers' torture of Iraqi prisoners have become apparent since the scandal was revealed on April 29, 2004 until May 30, 2004 and the period in which the coverage of this scandal had intensified not only in Al-Zaman, but in all newspapers, magazines and other media locally and internationally. And according to a research taken from Al-Zaman magazine that showed great interest in highlighting the event, interpreting it, following up its roots and results, and showing contradictory claims and slogans between the US and Britain, particularly in respecting human rights and the spread of justice, equality and well-being in Iraq specifical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2012
Journal Name
College Of Islamic Sciences
The amusement of the Qur'an shown Of the Prophet, peace and blessings be upon him, the Seal of the Messengers
...Show More Authors

The affliction is a remaining year and not a past incident, and the most evil people are the prophets - peace and blessings be upon them - and the most severe is the Imam of the Prophets Muhammad - may God bless him and grant him peace - because they are exposed to harm from their people because of their call to a religion that violates the religion of parents and grandparents, the religion of injustice and injustice And polytheism and disbelief, and therefore the Qur'an had attitudes towards the entertainment of the people of affliction in general and our beloved - peace be upon him - in particular, this research came about the entertainment of the Qur’an for the Prophet - may God bless him and grant him peace - and many areas of ente

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Lettuce Leaves as Biosorbent Material to Remove Heavy Metal Ions from Industerial Wastewater
...Show More Authors

The current study was designed to remove Lead, Copper and Zinc from industrial wastewater using Lettuce leaves (Lactuca sativa) within three forms (fresh, dried and powdered) under some environmental factors such as pH, temperature and contact time. Current data show that Lettuce leaves are capable of removing Lead, Copper and Zinc ions at significant capacity. Furthermore, the powder of Lettuce leaves had highest capability in removing all metal ions. The highest capacity was for Lead then Copper and finally Zinc. However, some examined factors were found to have significant impacts upon bioremoval capacity of studied ions, where best biosorption capacity was found at pH 4, at temperature 50º C and contact time of 1 hour.

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Algebraic strategy to generate pairwise test set for prime number parameters and variables
...Show More Authors

View Publication
Scopus (21)
Crossref (17)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Ijiset - International Journal Of Innovative Science, Engineering & Technology
Spray – casting CuInSe2 nanoink onto Au and Mo coated substrates to fabricate photovoltaics
...Show More Authors

Photovoltaic devices (PVs) were fabricated by spray-coating an ink of copper indium diselenide CuInSeR 2 R(CIS) nanocrystals as the light-absorbing layer. Without high-temperature post-deposition annealing, PVs were made on glass substrates with power conversion efficiencies of up to 1.5% and 0.9%, for Au and Mo coated respectively, under AM 1.5 illumination. UV–Vis spectrophotometer in the wavelength range 350–1500 nm. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CuInSeR 2 R have the chalcopyrite structure as the major phase and no secondary phase with a preferred orientation along (112) direction and The atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2.

View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Compare Linear Progamming With Other Methods to Finding Optimal Solution for Transportation Problem
...Show More Authors

The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Self-image addiction (Salafi) and its relation to narcissistic personality disorder among students
...Show More Authors

Abstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals

... Show More
View Publication Preview PDF