The study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information
The last ten years observed a shift enormous scientific in the method and way that it deals professional with the cost accounting and reflected the result those shift enormous scientific of increase the competitive environmental that accompanied the emergence of a modern manufacturing environmental on surface the long roductive life and emergence advanced information technology that give a central focus of his important on client with growing global markets growth on a large scale.
The research aim to define the concept of cost awareness, the concept and methods of strategic cost management and the role of cost awareness for managers of industrial units in strategic of cost managem
... Show More
Abstract
The aim of the research is to clarify the requirements of the qualification of the external auditor in Iraq and the extent of their impact on the quality of the professional performance of the audit process. The research was based on analyzing the results of the questionnaire prepared for the impact of qualifications on the quality of professional performance. The researcher has reached a number of conclusions, the most important of which is that a highly qualified and unethical auditor has a greater negative impact on the quality of professional performance than those with low qualifications. The most important recommendations of the research were the need to pay
... Show MoreThe paper presents the results of precise of the calculations of the diffusion of slow electrons in ionospheric gases, such as, (Argon – Hydrogen mixture, pure Nitrogen and Argon – Helium – Nitrogen) in the presence of a uniform electric field and temperature 300 Kelvin. Such calculations lead to the value Townsend's energy coefficient (KT) as a function of E/P (electric field strength/gas pressure), electric field (E), electric drift velocity (Vd), momentum transfer collision frequency ( ), energy exchange collision frequency ( ) and characteristic energy (D/?). The following physical quantities are deduced as function s E/P: mean free path of the electrons at unit pressure, mean energy lost by an electron per collision, mean velocit
... Show MoreIncreased the need to promote the profession of auditing, and improving the performance of the audit process, which comes through the effective implementation of its tasks, where the auditor collects the necessary data about the nature of client activity, and any other information it deems necessary to carry out the planning and development of the strategy for how to determine the procedures for implementing the audit process and the scope and timing for evidence clues in order to form an opinion technician neutral about the fairness of the financial statements, as required by the standards of the field work of the planning and supervision of the internal control and evidence to prove, but the failure of the auditor whether in th
... Show MoreAdopting a policy of attracting investments in all countries, whether developing or developed prevailed, especially after the global crisis, and this trend is imposed by considerations of political and development (urban, economic, and social) can be formulated as a rational policy to solve many problems related to patterns of urban growth, economic, social, and including the problem of housing. As the reality of the housing sector in Iraq will require the allocation of substantial resources to promote it by the research problem is the lack of financial resources and the inability of investments to meet the various requirements including the requirements of economic sectors, particularly in the field of housing, infrastructure an
... Show MoreSince I live in a society in which violence has become widespread, and killing among its own people flared up till they began to kill under the excuse of taking shelter, in these pages I would like to explain the status of taking shelter in the light of Islamic Law (Sharia), exploring scholars’ opinions in the legitimacy or illegitimacy of this issue according to the legal standards.
And, to acquaint people, and myself in the first place, with the true nature and the gravity of this issue; to expose it to those who are unaware of it; to remind those who are already aware of it. I would refute the fabrications, remove the suspicions which surround it untill it made the forbidden permissible; the wrong right. I would explain to those
Summary
This research is included in the study of one of the most important rules of jurisprudence, which is (necessity descends the status of necessity, controls and applications) branching from the major rule (hardship brings facilitation) and since the jurisprudential rule is defined as knowledge of a total or majority rule that applies to all its parts. He has to know all the branches that fall under him, which leads to understanding Sharia, controlling jurisprudential issues and linking them to its rules, so that no contradiction occurs, and he has the jurisprudential faculty that he promotes in consideration and diligence. And what is meant by need: is what is lacking in terms of expansion and raising the distress that often lea
The research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More