The international business environment faces many challenges, including the intensity of competition, the speed of expansion, and control of the market. This leads to its shadow on the local business environment, which prompted many economic units to adopt modern strategies, including mergers and acquisitions, for expansion and prosperity. The research was conducted to verify the role of internal audit in the governance of strategy operations (Mergers and acquisitions) and its reflection on management decisions and making them efficient and effective. Internal auditing is the independent variable related to the other variable, the governance of strategic operations and its impact on management decisions for strategic operations as a dependent variable. The research concluded that internal auditing has an influential role in the governance of the strategic process (Mergers and acquisitions), which is reflected in the management decisions, making them more efficient, and making the management achieve its strategy and succeed in the competitive market
It highlights the importance of research through its focus on the assessment of tax for settling accounts Mmakhr medicines and annual statement controls and its role in determining the taxable income of the real tax Mmakhr drugs and achieve tax equity through tax settling accounts. The tax authority relies annual controls laid down by the tax settling accounts for Mmakhr medicines despite their inclusion bookkeeping business No. 2 system for the year 1985 average .ually this basis formulated hypothesis (that the adoption of the tax authority on annual controls in the tax settling accounts for Mmakhr medicine does not contribute in determining income taxable real tax for this Almmakr). the resulting search for a number of conclusions and
... Show MoreAbstract
The Purpose of This Research is The Main Factors In out Comes Phenomena From Primary School Which in Creased in Lost Period in Iraq And to Find Solutions to The This Problem.
In Order to Achieve Al The Aim The Research Choose a Systematic Random Sample of School Records For Students in Some Primary Schools in Karkh and Rusafa and Year of Study (2010-2015) and Size (40) Samples, included (16) Variable , Collected in Form Prepared by The Research As a Way to Analyze The Data.
Remember to Summarize The (6) Main components Pay a Student to Drop out of Primary Schools in The Province of Baghdad are Arranged As Follows:
... Show MoreThe administrative leadership relies on a variety of behavioral paths in the functional areas in which it operates, and thus indicates its ability and thus has the upper hand in the organizational events, and in such a way that it can draw lessons and evaluate the results so as to test the expectations within the framework of the changes.
Does the study sample leadership have the characteristics that enable it to contain both crises and environmental stresses?
The aim of the study was to determine the location of the administrative leaders in the system of the study sample from the issue of crises and environmental pressures. The study concluded with a number of conclusions, the m
... Show MoreThe field study of this paper focused on the motives for lawyers to use the website
of the Supreme Judicial Council, and the gratifications achieved as a result of its use.
This study sought to achieve a number of goals, including:
1. Monitoring the patterns of lawyers’ use of the website of the Supreme Judicial Council.
2. Determining the forms that lawyers use to interact on the website of the Supreme
Judicial Council.
This study is a descriptive in kind as the researcher relied on the ‘survey method’ in
its study of the external audience (lawyers) using the questionnaire and scale toolThe questionnaire was distributed among a deliberately chosen sample, consisting of
(160) lawyers who used the website of
Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreIn this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show More In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .
In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform