Preferred Language
Articles
/
7hdfJJMBVTCNdQwCrcbb
The Role and Importance of Electronic Automation in Banking Service Development: A Case Study of the Commercial Bank of Iraq
...Show More Authors

Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exposed to various electronic crimes, especially money laundering crimes, so the challenge has become not in achieving the largest possible profits through the development of banking services, but in how to avoid the risks and losses resulting from that, so we will address in this study the various The motives that imposed the application of electronic automation in the field of banking services, as well as the risks facing the application process, through a statement of the challenges faced by banking institutions when applying the principles of electronic automation in the field of providing banking services in light of the necessity of change and the risks of development.

Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Fusion Power Density and Radiation Losses Characteristics for Tritium Fusion Reactions
...Show More Authors

A new data for Fusion power density has been obtained for T-3He and T-T fusion reactions, power density is a substantial term in the researches related to the fusion energy generation and ignition calculations of magnetic confined systems. In the current work, thermal nuclear reactivities, power densities of a fusion reactors and the ignition condition inquiry are achieved by using a new and accurate formula of cross section, the maximum values of fusion power density for T-3He and TT reaction are 1.1×107 W/m3 at T=700 KeV and 4.7×106 W/m3 at T=500 KeV respectively, While Zeff suggested to be 1.44 for the two reactions. Bremsstrahlung radiation has also been determined to reaching self- sustaining reactors, Bremsstrahlung values are 4.5×

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
"Social affiliation and its relation with compliance for Iraqi expatriates students"
...Show More Authors

Individual cannot live alone due to to his need for others to facilitate His supplies for living, thus social affiliation is considered one of the most important psychological, social needs in individuals life through his willing to affiliate to others whether they were friends ,family, colleague , or even home to reach some degree of  psychological stability.

       Affiliation is a tool to search for Satiate through living with group from the same type or comply for group or to be compatible with them or even to be adherent and accept what the group agreed about of criterion.

     &nbsp

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Fuel
Biodiesel from batch and continuous oleic acid esterification using zeolite catalysts
...Show More Authors

View Publication
Scopus (86)
Crossref (87)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Sep 20 2022
Journal Name
Journal Of The College Of Basic Education
Building challenge test for basic skills in soccer for students -third stage
...Show More Authors

The skill scale in most of sport activity monitoring a lot of dynamic behaviours conducted with playing situations that help the excerpt's in sport field to evaluate and put right solutions ,soccer one of games that studies in third stage in college and take skills ,dribbling , passing, shooting these skills helps to execute the plans in game ,the researchers notice that there is no test measure the skills of the game in the beginning of the first semester especially in the method of soccer in physical education college and the problem of the research were by answering the question that is there test connect between one or more that one of skill to measure the ability of students to execute the plans in soccer and the conclusion was the bui

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 04 2013
Journal Name
1st Post – Graduate Students Conference, Alnahrain University / College Of Engineering
Convection Heat Transfer in Horizontal Annulus Porous Media with Rotating Outer Cylinder
...Show More Authors

A numerical investigation of mixed convection in a horizontal annulus filled with auniform fluid-saturated porous medium in the presence of internal heat generation is carried out.The inner cylinder is heated while the outer cylinder is cooled. The forced flow is induced by thecold outer cylinder rotating at a constant angular velocity. The flow field is modeled using ageneralized form of the momentum equation that accounts for the presence of porous mediumviscous, Darcian and inertial effects. Discretization of the governing equations is achieved usinga finite difference method. Comparisons with previous works are performed and the results showgood agreement. The effects of pertinent parameters such as the Richardson number and internalRay

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Increasing Safety in Highways Transit Systems by Using Ethical Artificial Intelligence AI
...Show More Authors

“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical

... Show More
View Publication
Crossref
Publication Date
Sun Mar 29 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Water Injection for Oil Recovery in Mishrif Formation for Amarah Oil Field
...Show More Authors

The water injection of the most important technologies to increase oil production from petroleum reservoirs. In this research, we developed a model for oil tank using the software RUBIS for reservoir simulation. This model was used to make comparison in the production of oil and the reservoir pressure for two case studies where the water was not injected in the first case study but adding new vertical wells while, later, it was injected in the second case study. It represents the results of this work that if the water is not injected, the reservoir model that has been upgraded can produce only 2.9% of the original oil in the tank. This case study also represents a drop in reservoir pressure, which was not enough to support oil production

... Show More
View Publication Preview PDF
Crossref (5)
Crossref