Preferred Language
Articles
/
jeasiq-758
the challenges of accounting measurement of intangible assets of create additional value for the company and ways to address them
...Show More Authors

   This research seeks to shed light on what you add intangible assets of benefit to the company and this antagonize pause for consideration because it makes the company in a good competitive position stimulates the rest of the companies to acquire those assets.

   That many companies have achieved competitive advantages in the market do not even achieved monopolies increased the value and reaped extraordinary profits as a result of those assets which requires the need to be measured to determine the extent to which contribution in the emergence of the value added to the value of the company on the one hand and to make the presentation of financial statements The more credibility, has touched Quite a few authors in the scientific and academic research efforts to find benchmarks for those assets.

The research found a number of conclusions, including

  1. Intangible assets that need time to build and difficult to imitate by competitors، which is a source of strength for the formation of a competitive advantage.
  2. that the process of measuring the intangible assets fall under the measuring technique by which the derivative is determined by the values ​​of measurements indirectly based on mathematical models because it is not just a historic economic event depends accountant in measured on simple methods of the kind of direct.

The key findings of the research recommendations are as follows:

  1. should be classified as intangible assets and business applications as mentioned research as we believe that it helps in determining what kind of assets that add value to the economic unit.
  2. should resort to model market capitalization model or return on assets as a way to indirectly measure the intangible assets because it does not stray too far from the accounting rules as well as limited to the measurement of cash.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 10 2018
Journal Name
Day 3 Wed, December 12, 2018
Experimental Comparison between WASP and LSASF in Bartlesville Sandstone Reservoir Cores Bearing Heavy Oil
...Show More Authors

Low salinity (LS) water flooding is a promising EOR method which has been examined by many experimental studies and field pilots for a variety of reservoirs and oils. This paper investigates applying LS flooding to a heavy oil. Increasing the LS water temperature improves heavy oil recovery by achieving higher sweep efficiency and improving oil mobility by lowering its viscosity. Steam flooding projects have reported many problems such as steam gravity override, but override can be lessened if the steam is is alternated with hot LS water. In this study, a series of reservoir sandstone cores were obtained from Bartlesville Sandstone (in Eastern Kansas) and aged with heavy crude oil (from the same reservoir) at 95°C for 45 days. Five reservo

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Innovative Thinking and its Representations in Interior Space Design: علاء الدين كاظم منصور الإمام
...Show More Authors

        The current research studies the innovative thinking system in the field of the interior design, and the extent of the possibility of activating its work mechanisms as a strategy for the redesigning principle according the variables of the contemporary social thinking. The research aims at revealing the nature of the thinking criteria and requirements that provide strategic values that guide the interior designer and the architect to organize the mechanism the act of designing. It also contributes in dealing with the design product through activating its ability in innovation and redesigning.

       The research consists of the concept of innovation, the&nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sat Jan 07 2023
Journal Name
Journal Of Advanced Pharmacy Education And Research
Fimasartan attenuates edema and systemic changes in egg albumin-induced paw inflammation in rats
...Show More Authors

Angiotensin receptor blockers are well known for their therapeutic efficacy and fimasartan has been used safely and efficiently since 2010 in the treatment of hypertension. The study aimed to examine the anti-inflammatory effect of fimasartan in egg albumin-induced inflammation in rats. Rats were treated with diclofenac (25 mg/kg, intraperitoneally) or fimasartan at two different doses (3 or 10 mg/kg, intraperitoneally). The increase in the thickness of the paw was considered to be edema, which was measured using a vernier caliper. Serum was collected to analyze the systemic production of the inflammatory mediators TNF-α, and IL-6. The results showed that fimasartan in both doses significantly reduced edema in inflamed rat paws and produce

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Causative Organisms and Risk Factors In Bacterial Meningitis in Al-Elwia Childhood Hospital - Baghdad
...Show More Authors

Background: Childhood meningitis is a major
cause of morbidity and mortality, Hemophilus
influenza b (Hib) is the most common cause in
many countries, especially below 5 years and
before the development of conjugated Hib vaccine,
it is followed by Streptococcus Pneumonia, and
then N. meningitides, in addition to other
microorganisms.
Objective: To identify the causative organisms
of bacterial meningitis and to identify the factors
predisposing significantly to the incidence of
bacterial meningitis.
Method: This cross sectional , study was done in
Al-Elwia Pediatric Hospital during the period 1st
of January 2007 to 30th of June 2007.Eighty four
patients with presumptive diagnosis of meningitis<

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Social Graphic Design and its Reflection in Combating Drug Abuse: محمد عباس مظهر الزيدي
...Show More Authors

Social graphic design is the design that realizes the role and responsibility of the designer in society, and the use of graphic design in bringing about social change, especially as it is a professional contribution that plays an important role in the behavioral development of societies, and through the above, the researcher found a logical justification for his research problem, which is summarized by the following question: (What is the concept of Social Graphic Design and its implications in the fight against drug abuse)
While the two objectives of the research were identified in defining the social graphic design and its effect on combating drug abuse, and the theoretical framework was divided into two topics, the first study dea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Pathological And Immunological Study On Infection With Escherichia Coli In ale BALB/c mice
...Show More Authors

View Publication
Scopus (81)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Ecological Engineering
Chlorpyrifos Removal from Aqueous Solutions by Emulsion Liquid Membrane – Stability, Extraction, and Stripping Studies
...Show More Authors

Crossref (4)
Crossref
Publication Date
Thu Aug 18 2022
Journal Name
Sustainability
A Sustainable Cold Mix Asphalt Mixture Comprising Paper Sludge Ash and Cement Kiln Dust
...Show More Authors

Concerns about the environment, the cost of energy, and safety mean that low-energy cold-mix asphalt materials are very interesting as a potential replacement for present-day hot mix asphalt. The main disadvantage of cold bituminous emulsion mixtures is their poor early life strength, meaning they require a long time to achieve mature strength. This research work aims to study the protentional utilization of waste and by-product materials as a filler in cold emulsion mixtures with mechanical properties comparable to those of traditional hot mix asphalt. Accordingly, cold mix asphalt was prepared to utilize paper sludge ash (PSA) and cement kiln dust (CKD) as a substitution for conventional mineral filler with percentages ranging fro

... Show More
View Publication
Scopus (22)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref