This research dealt with shedding light on the nature of material misrepresentations, in addition to knowing the extent to which the quality of accounting information systems contributes to reducing material misrepresentations On the theoretical side, a number of sources were relied upon in dealing with the research problem and presentation of the topic, while in the practical side, it was relied on the questionnaire form, where the research sample was (accountants and auditors), where 50 forms were distributed and 50 were received, and the data was analyzed and hypotheses tested through the program Statistical spss to show the relationship between the variables. The research reached a number of conclusions, the most important of which is the accounting information system works to reduce the cases of fraud and error that the accounting information is exposed to.
Background: Health information systems in most countries are inadequate in providing the needed management support and the current health information systems are therefore widely seen as management obstacles rather than as tools,Objectives: the current study is an attempt to assess the behavioral and organizational determinants of health information system performance in Iraq.Methods: A cross-sectional study was conducted by interviewed a total of 189 respondents selected from six Iraqi governorates. The Organizational and Behavioral Assessment Tool was used to measure the behavioral and organizational determinants of health information system performance, it is one of the PRISM package tools that are used to assess the health informatio
... Show MoreLithium-rich layered oxide cathodes have attracted considerable attention due to their high energy density, but have suffered from voltage drop, structural instability, and limited electrical conductivity. In this study, the electrochemical performance of the lithium-rich cathode material Li[Li0.20Mn0.54Ni0.13Co0.13]O2 was evaluated after modification by zinc doping and composition with graphene oxide or graphene. The zinc-doped powders were synthesized by the sol-gel method, while the graphene-based composites were prepared by the hydrothermal route. The structural, morphological and electrochemical characteristics of the modified materials were examined using X-ray diffraction, Fourier transform infrared spectroscopy, field emission scann
... Show MoreE-learning seeks to create an interactive learning environment between the teacher and the learner through electronic media conveying in more than one direction, regardless of how the environment and its variables are identified. It also develops skills necessary to deal with technology in order to be able to take into account the individual differences between them and helps e-learning teacher and learner to achieve the goals set in advance and identify educational objectives in a clear manner. The research aims to identify e-learning in its benefits and management systems. It has three sections dealt with in the current research. Chapter II concentrates on the research Methodology, which consisted of three sections: The first s
... Show MoreThe aesthetic expression and its orders are important for steel structures forming. Steel structures are a compilation of structural elements, where its shapes have standard dimensions and pre-fabricated. As the steel construction systems not only aim to achieve the functional requirements for users, but must also have the symbolic aesthetics which provides visually and cognitive expression for viewers. In this sense the research interested in expressional aesthetics in these systems and highlights the importance of attention as structural items. Therefore the visual items which related with steel structures contain some of the most powerful forms of modern architecture, steel structures with a glass cladding, agility an
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More