The research aims to shed light on the obstacles that hinder the use of taxpayers' commercial books covered by provisions of the amended commercial book-keeping system No. 2 of 1985 and ways to address these obstacles. On this basis, the main null hypothesis was formulated that there is no statistically significant relationship between the obstacles to the adoption of the commercial books and taxable income.
The research data were collected on the base of three applied case studies of registered taxpayers in the General Commission of Taxes, GCT, together with the use of a questionnaire distributed to a sample of taxpayers ( companies ). The collected data were analyzed, the result were presented and the hypothesis was
... Show MoreThe energy aimed at examining the mode of energy drinks consumption among athletes in
Baghdad and assessing their drinks were spread greatly among the athletes and students. This
study impression toward such drinks. The study sample comprised of 102 mal athletes aged
between 19-27 years and selected randomly .The obtained results showed that football was
most practiced among the test samples at 40.54% based on twice daily .The athletes
consumed one can each day at 41.18% .As the data on energy drinks was supplied from
friends .The prefared period for drinking was before or during exercise .The athletes thought
that there products can provide energy ,vitamins ,tell ale materials ,does not affect
appetite.The most f
Summary
The book (Fatah al-Rahman reveals what is ambiguous in the Qur’an), which is a book of verbal similarities that tries to touch the Qur’an expression, and the subtle differences between its expressions and expressions. It appeared when it appeared in many chapters, from which I chose to delete in monolithic letters such as Ba and Ta, and to heal and delete in non-monosymbols such as (that) and (may) and (no), so the search came to two chapters The first is for deleting the monolithic letters, and the second is for deleting non-monosyllabic letters, preceded by introductory discussions revolving around the linguistic and idiomatic definition of deletion, a brief translation of the
... Show MoreThe aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt
... Show MoreThe study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla
... Show MoreSet dietary program for some of dietary supplements and training for badminton young players, and identifying effect of taking some of the dietary supplementary for badminton young players. The research population :( badminton young players group (Arminian club). For age group (16-18) years the sample is divided in to two experimental groups within each group (6) players, and two for the exploratory experiment which was within the research sample, they were divided in to two groups, the first group take some of the dietary supplements (multivitamin creating) .the set exercises by the researchers in the main part of the training unit and the second group (amino acids, vitamins) and the set exercises by the researcher. The scientific approach
... Show MoreBackground: Insufficient sleep due to excessive media use is linked to decrease physical activity, poor nutrition, obesity, and decreased overall health-related quality of life.
Objectives: To assess the effect of using the internet and social media on the sleep of 4th-stage secondary school students.
Subjects and Methods: Cross-sectional study with the analytic element; for 500 secondary school students, obtained by choosing two schools randomly from each of the six educational directorates, by using a structured questionnaire.
Result: Secondary scho
... Show MoreMany designs have been suggested for unipolar magnetic lenses based on changing the width of the inner bore and fixing the other geometrical parameters of the lens to improve the performance of unipolar magnetic lenses. The investigation of a study of each design included the calculation of its axial magnetic field the magnetization of the lens in addition to the magnetic flux density using the Finite Element Method (FEM) the Magnetic Electron Lenses Operation (MELOP) program version 1 at three different values of current density (6,4,2 A/mm2). As a result, the clearest values and behaviors were obtained at current density (2 A/mm2). it was found that the best magnetizing properties, the high
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreA study has been performed to compare the beddings in which ductile iron pipes are buried. In water transmission systems, bends are usually used in the pipes. According to the prescribed layout, at these bends, unbalanced thrust forces are generated that must be confronted to prevent the separation of the bend from the pipe. The bed condition is a critical and important factor in providing the opposite force to the thrust forces in the restraint joint system. Due to the interaction between the native soil and the bedding layers in which the pipe is buried and the different characteristics between them. Also, the interaction with the pipe material makes it difficult to calculate the real forces opposite to the thrust forces and the way they
... Show More