Preferred Language
Articles
/
uRZjSIcBVTCNdQwC5EGR
Cascade position-torque control strategy based on function approximation technique (FAT) for flexible joint robots
...Show More Authors

Crossref
View Publication
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Planning For Reducing the Phenomenon of Tax EvasionBy Developing the Role of the Equitable: Distribution of TaxBurdens on TaxpayersAn Applied Research in the General Commission Of Taxes
...Show More Authors

 The tax base is one of the bases of the technical organizing of taxes,   and that a good selection of the tax base effects the outcome of the tax and its fairness, and with the expansion of the tax range results a dangerous phenomenon called tax evasion, which became threaten the economies of countries and this phenomenon prevents the achievement of the state to its economic, political and social objectives which seeks to resolve this phenomenon and identifying all human and material potential and realize the real reasons that lie behind it.   The researcher found that tax authorities are weak in terms of it the technical material and financial abilities, the analysis of data show that then is a significant reve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 09 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Daniel's Model on the Acquisition of Concepts for the Arabic Language Curricula Among the Students of Department of Arabic Language in Colleges of Basic Education
...Show More Authors

The current research aims to investigate the effect of a specimen of Daniel in the acquisition of concepts for the Arabic language curricula material to the students of the third phase of the Faculty of Basic Education Department of Arabic Language. The sample consists of (93) applications and a student of (47) students in the Division (A), which represents the experimental group which studied the use of a specimen of Daniel, and (46) students in the Division (B), which represents the control group, which studied the traditional way. The subject of unified two groups, which subjects the Arabic language curricula which includes six chapters.
The duration of the experiment is a full semester. The researchers also prepared a tool for mea

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Effect of Polyherbs-Mixture Composed of Nigella sativa, Trigonella foenum - graceum, Cyperus rotundus and Teucrium polium on the Levels of Malondialdehyde and Glutathione for Diabetic Patients Type II
...Show More Authors

This study included estimation of glutathione (GSH) and Malondialdehyde (MDA) levels in the serum of diabetic patients type II who are treated with a polyherbs mixture (Nigella sativa, Trigonella foenum-graeum, Cyperus rotundus and Teucrium polium) for three months of treatments. Seventy samples of diabetic patients Type II male and females with age about (35-60) years were taken including 44 samples for group one (24 male, 20 female) who used herbs accompanied with chemical treatment (drugs) and 26 samples for the second group (13male and 13 female) who used herbs only. These groups were compared with 60 samples obtained from healthy persons (29 male, 31 female) at the same age of patients as a control group. Effect of age and treatment fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Supply Chain Management
The effect of internal training and auditing of auditors on supply chain management: An empirical study in listed companies of Iraqi stock exchange for the period 2012-2015
...Show More Authors

Scopus (31)
Scopus
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of the financing structure on investment decisions : Applied research in a sample of commercial banks listed in the Iraq Stock Exchange for the period (2011-2020)
...Show More Authors

               The research aims to shed light on the financing structure, which is one of the important pillars of financial management in the commercial banking sector, which enhances its financial position through financing its various investments, which is one of the pillars of the successful economy of the commercial banking sector. in which country. The contents of the research variables, which were represented by the independent variable, financing structure, the dependent variable, and investment decisions in commercial banks, which the researcher tried to address, as the research began with a basic variable that depends on diagnosing the impact of the financin

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Variables (Bias-cut) of Tailoring and their Effect on the Quality of Fitting the Standard Pattern for Large-Shaped Iraqi Ladies: رشا علي صالح , بشرى فاضل صالح التميمي
...Show More Authors

The present research is descriptive and analytical by nature; it practically presents the method of implementing the standard pattern in an unconventional way using the bias-cut line. The study aims at investigating the variables of bias-cut and their suitability for fitting large-shaped Iraqi ladies. It also aims at exploring the artistic and innovative features of the bias-cut. Therefore, one needs to understand the rules and basics of clothing and the nature of the body to reach the maximum degree of control.Consequently, the study is to answer the following questions: What is the effectiveness of tailoring on the bias-cut in fitting a standard template of a large-shaped Iraqi ladies? Is it possible to obtain from the offered possibil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Smart Innovation, Systems And Technologies
The Effect of Exercises According to the Ranges of Arm Movement and Their Effect on Muscle Strength, and Some Biomechanical Variables, and Javelin Throwing Achievement for Young People
...Show More Authors

This present study is aimed at deciding the impact of exercises adapted to the ranges of movements of the arm on the performance of javelin throwing. As long as javelin throwing is quite a complex athletic event that presupposes a considerable amount of strength, speed, and biomechanical accuracy, it is crucial to learn whether the exercises designed to target the peculiarities of arm movements can have a positive effect on the performance of javelin throwers. To the study, experimental research with a single group of six youth javelin throwers was carried out. Before and after the eight-week training program, the pre-tests and post-tests were conducted to find the results of training with a specific focus on resistance exercises. Significa

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
on subliminal cryotography
...Show More Authors

in recent years cryptography has played a big role especially in computer science for information security block cipher and public

View Publication Preview PDF
Publication Date
Tue Jan 01 2002
Journal Name
Iraqi Journal Of Science
On Regular Modules
...Show More Authors

Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.

Preview PDF