This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of data, cost savings, and the pace of business completion. Therefore, relying on auditing a large volume of financial data is insufficient. The Metaverse is a novel technological advancement seeking to fundamentally transform corporate operations and interpersonal interactions. Metaverse has implications for auditing and accounting practices, particularly concerning a company’s operational and financial aspects. Economic units have begun to switch from traditional methods of registration and posting to using software for financial operations to limit earnings management. Therefore, this research proposes applying one of the Data Mining techniques, namely the logistical regression technique, to reduce earning management in a sample of Iraqi private banks, including (11) banks. Accounting ratios were employed, followed by Logistic Regression, to achieve earnings management within the proportions.
The aim of this research is to demonstrate the nature of the interactive relationship between the dimensions of the requirements of economic intelligence Represented by(Administrative and regulatory requirements, human requirements, and technical requirements) The strategic success of banks is represented by (Customer satisfaction, customer confidence, quality of service, growth) In three of the Iraqi banks own bank(Middle East Iraqi Investment, Al Ahli Iraqi, Gulf Commercial), The questionnaire was adopted as a tool for collecting data and information Of the sample (85) Who are they(Director of the Commissioner, M. Director Plenipotentiary, Director of Department, Director of Section, M. Section Manager, Division Officer, Unit Officer),
... Show MoreThe paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme
... Show MoreThe objective of this study is to demonstrate the corrosion behavior of dental alloys Co-Cr-Mo, Ni-Cr-Mo and Ti-Al-V in artificial saliva at pH=4 and 37oC enriched with ethyl alcohol at 8% percentage. The linear and cyclic polarizations were investigated by electrochemical measurements. Laser surface modification was achieved for the three dental alloys to improve corrosion resistance. The results show that corrosion resistance of Co-Cr-Mo and Ni-Cr-Mo alloys only were increased after laser treatment due to the fact that laser radiation has caused a smoother surface, in addition to the decrement in corrosion current densities (icorr) for Co-Cr-Mo and Ni-Cr-Mo alloys and the reverse scan in cyclic polarization became in the wider range of
... Show MoreThe city of Karbala is one of the most important holy places for visitors and pilgrims from the Islamic faith, especially through the Arabian visit, when crowds of millions gather to commemorate the martyrdom of Imam Hussein. Offering services and medical treatments during this time is very important, especially when the crowds head to their destination (the holy shrine of Imam Hussein (a.s)). In recent years, the Arba'in visit has witnessed an obvious growth in the number of participants. The biggest challenge is the health risks, and the preventive measures for both organizers and visitors. Researchers identified various challenges and factors to facilitating the Arba'in visit. The purpose of this research is to deal with the religious an
... Show MoreIn the last few years, there have been a lot of changes in the economy, society, and the environment. This has led to much competition between companies, directly and indirectly affecting production and marketing processes. Most companies are trying to cut production and manufacturing costs by using modern cost techniques such as product life cycle costing and Continuous Improvement (Kaizen) technology, in the method of measuring production costs or service costs, and the need for internal control to keep an eye on how these technologies are being used and how well they work. And to find out the effect of internal control on the implementation of costing techniques in Iraqi companies, 64 questionnaires were given to people who work in the i
... Show MoreDeveloping smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects,
... Show MoreObjective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte
Background: Complete denture wearers show lower levels of bite force than dentate subjects. This has a significant influence on their chewing efficiency. In this study an attempt was made to investigate the effect of the impression technique on the maximum bite force in complete denture wearers. Materials and methods: The patients selected for this research were 12 edentulous patients. Three different techniques for registering the final impression were made; the mucostatic, mucofunctional, and the selective pressure impression technique. Two sets of upper and lower denture bases and one set of upper and lower dentures were constructed for each subject. Intraoral and extraoral instruments and devices, as well as a computer program were used
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More