Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreThe research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi
... Show MoreHydrated lime has been recognized as an effective additive used to improve asphalt concrete properties in pavement applications. However, further work is still needed to quantify the effect of hydrated lime on asphaltic concrete performance under varied weather, temperature, and environmental conditions and in the application of different pavement courses. A research project was conducted using hydrated lime to modify the asphalt concretes used for the applications of wearing (surface), leveling (binder), and base courses. A previous publication reported the experimental study on the resistance to Marshall stability and the volumetric properties, the resilient modulus, and permanent deformation at three different weather temperatures. This
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreThe futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu
... Show MoreThe present work reports an approach of hydrothermal growth of ZnO nanorods, which simplifies the production of low cost films with controlled morphology for H2S gas sensor application. The prepared ZnO nanorods exhibit a hexagonal wurtzite phase analyzed by the X-ray diffraction analysis. The FTIR spectra provide information that the band located between 465-570 cm-1 corresponds to the stretching bond of Zn-O, which confirms the creation of ZnO. PL spectroscopic studies showed that the doping of Ag NPs and f-MWCNT in the ZnO matrix leads to the tuning of the bandgap. The SEM analysis showed the morphology of ZnO was the nanorods. The nanocomposites Ag/ZnO and F-MWCNT/ZnO which prepared, sep
... Show MoreThe moral aspect is an important one in the structure of personality , and the lack of moral aspect is responsible for what we suffering today from problems . there is no exaggeration to say that many of our current problems are moral problems , and reflects the lack of moral growth.
The goal of research is to build scale in order to detect the level of moral reasoning among junior high school students in Baghdad , The researcher followed the procedures in the construction of scientific standards in order to measur
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More