Preferred Language
Articles
/
BRfOWo4BVTCNdQwCQUTI
A note on s-acts and bounded linear operators
...Show More Authors

Scopus
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 15 2025
Journal Name
Alustath Journal For Human And Social Sciences
Representational and Interactional Meanings of UNHCR Reports on Displaced Iraqis
...Show More Authors

The use of appropriate and accurate language is of utmost importance when describing people on the move and their dilemma, particularly refugees and displaced persons who have unique legal protection. So, there are a lot of scholars who have investigated the United Nations High Commissioner for Refugees’ (UNHCR) reports, but no one has examined representational and interactional meanings of UNHCR reports. Accordingly, this research aims to explore the role of UNHCR reports in enhancing the value of the humanitarian, which is attributed to the uniqueness of its use of language. The current study investigates the manner in which the textual content interacts with the images that are associated with the category of the UNHCR reports. Four re

... Show More
View Publication Preview PDF
Publication Date
Tue May 07 2019
Journal Name
Acm Journal On Emerging Technologies In Computing Systems
Neuromemrisitive Architecture of HTM with On-Device Learning and Neurogenesis
...Show More Authors

Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil

... Show More
View Publication
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Sep 08 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Strategic tax planning and its impact on reducing tax evasion
...Show More Authors

Taxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Numerical Research on Flow-Induced Vibration in Valves
...Show More Authors

Abstract  

All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Bionatura
Effect of cultivars and harvest dates on rice seeds vigore
...Show More Authors

A laboratory experiment was carried out according to a completely randomized design with four repetitions on the seeds resulting from a field experiment applied for the two seasons, 2020 and 2021, to find out the effect of the cultivars (Ambar 33, Yasamin, Dijlah, Ambar Al-Baraka and Furat 1) and the harvest dates (at physiological maturity and after 7 and 14, 21 and 28 days of physiological maturity) on the vigour of rice seeds. The results showed the superiority of the seeds of the cultivar Anbar Al-Baraka at first and final counting, dry weight of the seedling, seedling vigor index and electrical conductivity, and the superiority of the seeds of Dijla cultivar at accelerated aging test and cold test without significant difference with th

... Show More
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Causes and Effects of Earnings Management on Stock Prices
...Show More Authors

This study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.

For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan

... Show More
View Publication Preview PDF
Crossref (4)
Crossref