رقابة القاضي على تنفيذ قرارات التحكيم التجاري الدولي وفًقا لاتفاقية نيويورك
The research aims to identify the definitional framework for accounting violations and audit procedures in accordance with international auditing standards, preparing a proposed audit program to audit violations resulting from the transition to the unified accounting system in the research sample according to the relevant international auditing standards, as the proposed audit program was prepared according to International auditing standards in order to improve the auditor’s procedures in detecting accounting violations when auditing the financial statements of municipal departments. The research concluded the most important recommendations: The necessity of adopting the audit program proposed by the researcher, for the purpose of act
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreSome auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show MoreThe uptake of Cd(II) ions from simulated wastewater onto olive pips was modeled using artificial neural network (ANN) which consisted of three layers. Based on 112 batch experiments, the effect of contact time (10-240 min), initial pH (2-6), initial concentration (25-250 mg/l), biosorbent dosage (0.05-2 g/100 ml), agitation speed (0-250 rpm) and temperature (20-60ºC) were studied. The maximum uptake (=92 %) of Cd(II) was achieved at optimum parameters of 60 min, 6, 50 mg/l, 1 g/100 ml, 250 rpm and 25ºC respectively.
Tangent sigmoid and linear transfer functions of ANN for hidden and output layers respectively with 7 neurons were sufficient to present good predictions for cadmium removal efficiency with coefficient of correlatio
... Show MoreThe current research aims to train students to take benefit of their studies to analyze and taste the artistic works as one of the most important components of the academic structure for students specializing in visual arts; then to activate this during training them the methods of teaching. Consequently, the capabilities of mind maps were employed as a tool that would be through freeing each student to analyze a model of artistic work and think about his analytical principles according to what he knows. Then, a start-up with a new stage revolves around the possibility of transforming this analysis into a teaching style by thinking about how the student would do. The same person who undertook the technical analysis should offer this work
... Show MoreFifty-four Sprague-Dawley albino adult male rats were classified into three main groups each of 18 rats treated for a particular duration (1,2, and 4) weeks respectively. Each group was subdivided into three subgroups each of six rats treated as follows; group (1) serve as normal control, group (2, and 3) intra-peritoneal treated with TiO2NPs (50,200) mg/kg respectively, body *weight of all rats was measured before and after the experiment, then rats were dissected at the end of each experiment and the weights of the thyroid was measured. The result showed a highly significant decrease (p<0.01) in thyroid gland weight, a highly significant increase (p<0.01) in body weights and TSH, while a highly significant decrease (p&
... Show MoreA particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.
لقد أدت التطورات العلمية والتقنية وتطبيقاتها العملية في مختلف ميادين الحياة بشكل عام وميدان التربية والتعليم بشكل خاص إلى ظهور تغيرات في البناء التعليمي وطرائق التدريس بصيغتها الحديثة التي تنسجم في مجملها وروح العصر مما دعى المؤسسات التربوية والتعليمية وبإيعاز إلى الباحثين والمهتمين بهذا الميدان الى ضرورة متابعة الاتجاهات الحديثة ونواحي التجديد لمحتوى العملية التعليمية فيما يتعلق بالمجالات المعر
... Show Moreتعد ظاهرة الارهاب المتزايدة في العالم من اخطر اشكال التهديدات الامنية التي تواجة الدول لانها تستهدف في جانب مهم منها امن واستقرارومستقبل مجتمعاتها لاسيما اذا جمع الفعل الارهابي بين مطامع واهداف القوى الخارجية التي لا تريد استخدام ادواتها المباشرة وانما بالاعتماد على محركات في خلق الازمات داخل الدول المستهدفة
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More