This research dealt with shedding light on the nature of material misrepresentations, in addition to knowing the extent to which the quality of accounting information systems contributes to reducing material misrepresentations On the theoretical side, a number of sources were relied upon in dealing with the research problem and presentation of the topic, while in the practical side, it was relied on the questionnaire form, where the research sample was (accountants and auditors), where 50 forms were distributed and 50 were received, and the data was analyzed and hypotheses tested through the program Statistical spss to show the relationship between the variables. The research reached a number of conclusions, the most important of which is the accounting information system works to reduce the cases of fraud and error that the accounting information is exposed to.
In order to activate theatrical discourse aware of the changes imposed by the nature of the contemporary child in terms of stimulating the social skills that achieve a technical and aesthetic convergence between him and theatrical presentation by investing the fact of the existence of the child and its potential in the weaving of stories, and folk in the imagination, and simulation of what corresponds with the characters and icons interact with them through technologies In the light of this research came the following address: (ways to stimulate the skills of the child through a contemporary theatrical speech) where the researcher seeks to delineate the importance involved in the discourse of theater through ways to reach the pillars con
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThis booklet contains the basic data and graphs forCOVID-19 in Iraq during the first three months of thepandemic ( 24 February to 19 May - 2020 ) , It isperformed to help researchers regarding this health problem (PDF) Information Booklet COVID-19 Graphs For Iraq First 3 Months. Available from: https://www.researchgate.net/publication/341655944_Information_Booklet_COVID-19_Graphs_For_Iraq_First_3_Months#fullTextFileContent [accessed Oct 26 2024].
The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreThe characteristics of physical architecture in the Levant and the island are characterized by a lot of attention and care, as they are a pillar of the urban movement in every place and time.
With occurrence of any financial crises, regardless at global or regional levels such as the great economic crises during 1929 – 1933 and the Asian financial crises at the end of twentieth century as well as the current global financial crises that started during second half 2008, we acknowledge that there are some critics loudly articulated accusing accountants and auditors for disparences, and they are numerical partner of financial manipulation as well as corrupted administrators with the company's administrators that they are difficulty. At this point, many suggestions and recommendation for upgrading the accounting system has been made.  
... Show More