Preferred Language
Articles
/
jpgiafs-109
The Role of Benford’s law to appreciation the risk in financial transactions: Application study in Baghdad University
...Show More Authors

The financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is contributions to fraud detection, the Benford’s law is consider control tool and one from this Techniques that using in multiple sides in the Audit and control, and statically method provide indict to auditor about risk level in balances for accounts and transaction. The research aims to shed light the role of Auditor in risk appreciation and information control, and important Benford’s law in appreciation a fraud detection risk in financial fraud in audit.The Researchers have found gropes from conclusions its important; the Benford’s law is control tool contribution in appreciation a fraud risk actively, as well as the role it’s in the fraud detection. The researchers are grope recommendations important its should from Auditor using modern tools in audit and financial control, And the Benford’s is consider one from this technique.

Keyword: Benford’s law, fraud, detection risk.

Crossref
View Publication
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Structural and Optical Properties of SnS2:Cu Thin films prepared by chemical Spbay Pyrolysis
...Show More Authors

Thin filis have been prepared from the tin disulphide (SnS2 ), the pure and the doped with copper (SnS2:Cu) with a percentages (1,2,3,4)% by using ahemical spray pyrolysis techniqee on substrate of glass heated up to(603K)and sith thicknesses (0.7±0.02)?m ,after that the films were treated thermally with a low pressure (10-3mb) and at a temperature of (473K) for one hour. The influence of both doping with copper and the thermal treatment on some of the physical characteristics of the prepared films(structural and optical) was studied. The X-ray analysis showed that the prepared films were polycrystalline Hexagonal type. The optical study that included the absorptance and transmitance spectra in the weavelength range (300-900)nm

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 10 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Clinical Learning and Training Environment for Maternal and Child Health Nursing Students
...Show More Authors

Objective: To assess the clinical learning environment and clinical training for students' in maternal and child
health nursing.
Methodology: A descriptive study was conducted on non probability sample (purposive) of (175) students' in
Nursing College/ University of Baghdad for the period of June 19th to July 18th 2013. A questionnaire was used as a
tool of data collection to fulfill with objective of the study and consisted of three parts, including demographic,
clinical learning environment and clinical training for students' in maternal and child health nursing. Descriptive
statistical analyses were used to analyze the data.
Results: The results of the study revealed that the 65.1% of student at age which ranged b

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Int J Mol Cell Med
Caspase Dependent and Independent Anti-hematological Malignancy Activity of AMHA1 Attenuated Newcastle Disease Virus
...Show More Authors

Hematological malignancies remain one of the leading causes of death worldwide despite advances in cancer therapeutics. Newcastle disease virus (NDV) is a member of Paramyxoviridae that elicits considerable interest as an anticancer agent because it can replicate up to 10 000 times faster in human cancer cells than in most normal cancer cells. Several NDV strains reportedly induce the cytolysis of cancerous cell lines. The attenuated Iraqi strain (AMHA1) of NDV is a novel oncolytic agent with promising antitumor characteristics, including apoptosis induction. This study aimed to evaluate the ability of the AMHA1 NDV strain to induce apoptotic cell death in hematological tumors through caspase-dependent or independent apoptotic pathways. The

... Show More
Publication Date
Sun Nov 23 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Force decay of orthodontic elastomeric chains by using three different mechanisms simulating canine retraction
...Show More Authors

Background: The ideal force-delivery system must: provide optimal tooth moving forces that elicit the desired effects, be comfortable and hygienic for the patient, require minimal operator manipulation and patient cooperation and provide rapid tooth movement with minimal mobility during orthodontic therapy, the elastomeric chains have the greatest potential to fulfill these requirements. Materials and Methods: This in vitro study was designed to determine the effect of three different mechanisms for canine retraction : (6-3 , 6-5-3 and chain loop ) on the load relaxation behavior of three types of elastomeric chains : (maximum clear , maximum silver and extreme silver) from the same company (Ortho Technology company) with two different bran

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis and Characterization of New Phthalimides Containing 1, 2, 4-triazole and Imine Group
...Show More Authors

Several new derivatives of 1, 2, 4-triazoles linked to phthalimide moiety were synthesized through following multisteps. The first step involved preparation of 2, 2-diphthalimidyl ethanoic acid [2] via reaction of two moles of phthalimide with dichloroacetic acid. Treatment of the resulted imide with ethanol in the second step afforded 2, 2-diphthalimidyl ester [3] which inturn was introduced in reaction with hydrazine hydrate in the third step, producing the corresponding hydrazide derivative [4]. The synthesized hydazide was introduced in different synthetic paths including treatment with carbon disulfide in alkaline solution then with hydrazine hydrate to afford the new 1, 2, 4-triazole [10]. Reaction of compound [10] with different alde

... Show More
Publication Date
Wed Sep 05 2007
Journal Name
Neural Network World
A canonical generic algorithm for likelihood estimator of first order moving average model parameter
...Show More Authors

The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot

... Show More
Scopus (3)
Scopus
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Factors Affecting Birth Space Interval of Women Who Are Attending Primary Health Care Centers
...Show More Authors

Objective: The aim of this study is to determine the factors affecting birth space interval in a sample of women.
Methodology: A cross-sectional study conducted in primary health centers in Al-Tahade and Al- Shak Omar in
Baghdad city. Data were collected by direct interview using questionnaire especially prepared for the study.
Sample size was (415) women in age group (20-40) years who were chosen randomly.
Results: Analysis of data shows highest rate of women (31.8%) had a birth space interval of (8-12) months
followed by (26.7%) had a birth space interval of (19-24) months, (20.2%) had a birth space interval of (>24)
months and (16.1%) had a birth space interval of (13-18) months respectively, while lower rate of w

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Effect of Water on Some Mechanical Properties for Sawdust and Chopped Reeds /UPE composites
...Show More Authors

In this study, composite materials were prepared using unsaturated polyester resin as binder with two types of fillers (sawdust and chopped reeds). The molding method is used to prepare sheets of UPE / sawdust composite and UPE / chopped reeds composite. The mechanical properties were studied including flexural strength and Young's modulus for the samples at normal conditions (N.C). The Commercial wood, UPE and its composite samples were immersed in water for about 30 days to find the weight gain (Mt%) of water for the samples, also to find the effect of water on their flexural strength and Young's modulus. The results showed that the samples of UPE / chopped reeds composite gained highest values of flexural strength (24.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synthesis, Characterization and Evaluation of Overbased Magnesium Fatty Acids Detergent for Medium Lubricating Oil
...Show More Authors

A series of overbased magnesium fatty acids such as caprylate, caprate, laurate, myristate, palmitate, stearate and oleate) were synthesized by the reaction of the fatty acids with active – 60 magnesium oxide and carbon dioxide (CO2) gas at 60 oC in the presence of ammonia solution as catalyst, toluene / ethanol solvent mixture (9:1vol/vol) was added.
The prepared detergent additives were characterized by FTIR, 1HNMR and evaluated by blending each additive in various concentrations with medium lubricant oil fraction (60 stock) supplied by Iraqi Midland Refineries Company. The total base number (TBN, mg of KOH/g) was determined, and the results of TBN were treated by using two-way analysis of variance (ANOVA) test. It was found that

... Show More
View Publication Preview PDF