The Mediating Role of Cobit 2019 in Managing the Relationship Between Qualitative Characteristics of Accounting Information and Information Asymmetry
We can summarize the main risk factors for type 2 diabetes mellitus (T2DM) by looking at our nutrition, age, and lifestyle. β-cell dysfunction and insulin resistance (IR) are outcomes of the pathophysiology of type 2 diabetes. As an indirect result of IR on important metabolic enzymes, lipid and lipoprotein abnormalities are also a factor in T2DM patients. Recent research has indicated that lipid fluctuation may be the cause of poor glucose metabolism as well as one of its effects. Fatty acids (FAs) affect cell membrane fluidity and permeability, insulin receptor binding and signaling, and the translocation of glucose transporters. Therefore, it is suggested that FAs might play a crucial part in the emergence of IR and T2DM. The cu
... Show MoreBackground: Neonatal septicemia is a significant cause of morbidity and mortality worldwide especially so in developing countries. To reduce the mortality caused by neonatal septicemia, it became vital to diagnose it as soon as possible and treat with administration of appropriate antibiotics.Objective: To study the relationship between themicroorganisms isolated from septicemic neonates with place of delivery.Patients and Methods: Blood sample was obtained from 76 neonates (50 of them are born in Baghdad teaching hospital (Inborn), 26 of the babies are born at home or in Al-Elwya teaching hospital (out born) ,the laboratory diagnosis for the out born patients done in the same hospital(Al-Elwya teaching hospital .The aged of the neo
... Show MoreThe skill of management educational activities gradually grow with the experience, but they differ from personal skill educator to another, because each style nanny personally and the way to work. There educator and active movement and vitality that look like happiness and clear during the implementation of the activity, and the other runs educational activities quietly, efficiently and without emotion and clear (dry, 2001: p. 274). And the stage of childhood is one of the most important stages that are based upon the future life as a whole because the man also confirmed by the School of analysis psychological is the son of his childhood and the best example to us what the Holy Prophet Muhammad (peace be upon him): (Every child i
... Show MoreAfter the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThis research aimed to evaluate the level of readiness to teach science in the light of the information, media, and technology skills among undergraduate students at the Faculty of Edu-cation, King Khalid University. To achieve this goal, a descriptive and analytical approach was used. A list of readiness to teach science was prepared in the light of Information, media, and technology skills, and in the light of this list, a cognitive test, observation sheet, and attitude scale were prepared to assess readiness to teach science in its three aspects, cognitive, behavioral, and emotional. The sample of the research consisted of (42) students enrolled in field training courses at the sixth, seventh and eighth levels. Research tools were app
... Show MoreAbstract\
The developed financial infrastructure is one of the most important elements for achieving stable financial system in a country. The importance of developed financial infrastructure comes from its role in create economic and financial context attractive for foreign investments. Thus, this paper aims first to measure an index of financial infrastructure, and secondly, to gauge the nexus between the developed financial infrastructure and foreign investments inflow in Malaysia and Indonesia. We estimate the index of financial infrastructure by using different indicators such as (the institutional environment, access to finance, legal environment, and others).
By using the G
... Show MoreThe political movements of Islam are among the most prominent phenomena of the popular uprisings witnessed by the Arab world. However, this rise and the rise of some movements led to many problems on the political theses of Islam, especially those associated with the ideas of Islamic ideologues and their slogan Legitimacy and the authorities as the origin of the divine, and said the application to achieve the Islamic solution, and then became the state in theses of some Islamists a tool to apply the law and then the preservation of religion.