Preferred Language
Articles
/
tRdeVJIBVTCNdQwC9Ks_
That the child is aged 7 years, surrounded by information, knowledge and skillsvaried,
...Show More Authors

Abstract That the child is aged 7 years, surrounded by information, knowledge and skillsvaried, which constitute the raw material of experience teaching and is in the rule of inputlearning, if received by the student of these data are positive, these data require research and audit, the style becomes more positive, effective, and then becomes the explorer, butnot done exploration efficiency without the visual, auditory and sensory owned by thechildren. So study aimed to identify the values of the optical track and explore mathematical and find the relationship between them. And use the descriptive approach in a manner the linkon the children of the first year of primary school age (6-7) years in my school Waziriya and Karkh, during the period from 01/10/2011 till 11/10/2011. By testing the optical track (as an indicator of the efficiency of optical) and the measure of exploratory behavior sports.After processing the data the researchers concluded that there is significant correlationbetween the optical track and the measure of exploratory behavior in children sports the first year of primary school. Therefore recommends that researchers need to addresscapacity optical and optical tracking in children because of their active role in theexploration and obtain information from the surrounding environment.

View Publication
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effective role of computer information systems in the tax assessment process
...Show More Authors

The objective of this study is to enable the role of modern and advanced computerized information systems. The model or mechanism should be developed by collecting the necessary information about the taxpayers and the sources of the taxpayers' income, on the basis of which the accuracy of the inventory process will be adopted. In addition to studies related to computerized information systems and showing their importance to the tax institution. To achieve the objectives of the study and to answer its questions, the researcher relied on collecting data and information on the subject on the literature and previous studies The secondary sources, which also formed the theoretical framework of the study, were obtained either as a practical fr

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The evaluation a proposed strategy for the Ministry of Planning for the years 2018-2022 .
...Show More Authors

abstract

the research discussed a stage of strategic management. The strategic of the evaluation of the proposed strategy through feedback is to ensure that it is implemented with the least possible variation. The research aims at evaluation  a proposed strategy for the Ministry of Planning for the years 2018-2022 in line with the orientations of the state, taking into account the surrounding environmental conditions. It relies on scientific bases and steps to formulate the strategy The extent of the strategy suitability was tested through a set of statistical means and its objectivity was verified through a survey of a number of specialized experts who were selected in accordance with the principle

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the proposed strategy of Maysan Oil Company for the years 2020-2024
...Show More Authors

ناقش البحث في طياته عدداً من القضايا الرئيسة المتعلقة بالتقييم الاستراتيجي والإطار العام للخطة الاستراتيجية المقترحة لشركة نفط ميسان للسنوات الخمس المقبلة (2020_2024)، وهدف هذا البحث يتمحور في تقييم عملية صياغة استراتيجية شركة نفط ميسان لتحديد نقاط القوة وتعضيدها ومواطن الضعف ومحاولة معالجتها لتجنب الوقوع بها عند وضع استراتيجية للسنوات القادمة، وعلى هذا الاساس فان مشكلة البحث تكمن في مدى نجاح الاستراتي

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The evaluation of the role of the information system in reducing tax evasion
...Show More Authors

This research attempts to evaluate the role of the information system by highlighting its importance in providing date and information to the tax administration the process of tax accounting for those who are subject to income tax whether they are individuals or companies where the effective information system provides accurate and reliable information in a timely manner.

At the theoretical part of the research, the research approaches the problem of the research represented in that whether the information system, applied in the General Commission for Taxes, is capable of achieving its role in reducing the phenomenon of tax evasion. The existence of a set of things which in the Commission may lead to increase tax evasion by taxpa

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Revue Africaine D'études Juridiques Et Politiques
Civil Liability of Hotels Towards the Victims of the Terrorist Operations that Take Place in Them
...Show More Authors

At a time when any tourist in the world wants a trip to reload his energy and enjoy peace and quiet and engage in adventures in a safe environment, terrorism comes to disturb him on that journey through operations aimed at the tourist and entertainment destinations, such as shops, restaurants, cafes and hotels Is the orbit of research) for many reasons. The security measures taken by hotels play an important and fundamental role in preventing or limiting these terrorist operations. At the same time, while some hotel administrations are constantly seeking to improve these measures to preserve the safety of their guests and visitors, In spite of the high number of attacks on hotels since 2001 and today. This research is intended to highlight

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
The Reduction in the design structure ofThe emblems ofIraqi sports clubs is amodel
...Show More Authors

   Singled current study on the subject of shorthand in structure designs logos (Iraqi sports clubs model), as the current study Tdmt four chapters, was in the first chapter defines the research problem and its significance, as well as the aim of the research in the know shorthand formal in structure designs logos (Iraqi sports clubs model ), and identifies Find time limits: - slogans Iraqi sports clubs for the years (1956 - 1970), because it represented the years to include designs slogans official Iraqi sports clubs that have been elected in this period for the purpose of examining the reality of the design in the current search. And it represented the spatial limits: - the Republic of Iraq - Iraqi slogans designs sports

... Show More
View Publication Preview PDF
Crossref