Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exposed to various electronic crimes, especially money laundering crimes, so the challenge has become not in achieving the largest possible profits through the development of banking services, but in how to avoid the risks and losses resulting from that, so we will address in this study the various The motives that imposed the application of electronic automation in the field of banking services, as well as the risks facing the application process, through a statement of the challenges faced by banking institutions when applying the principles of electronic automation in the field of providing banking services in light of the necessity of change and the risks of development.
<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreObjective: This research aimed to study the relation between maximal bite force (MBF) and maximum mouth opening among 12-year-old school children. Methods: In this cross-sectional study, a total of 400 children aged 12 years (194 boys and 206 girls) were examined. The MBF for the right and left side, as well as the anterior region, were evaluated for all children. The MMO was measured using an electronic digital caliper. To analyze the data path analysis method was used. Results: Boys showed a higher MMO of 48.797 ± 6.500 than girls (46.710 ± 5.926 mm). The MMO increased with increasing MBF, with significant differences between females and males. Conclusion: The MMO was higher in boys than in girls. Gender plays a significant ro
... Show MoreNormally, bacteria exposed to antibiotics at sub minimal inhibitory concentrations (MIC) inside the host. Therefore, the current study aimed to comprehend the association among hemolysins, biofilm, as well as gentamicin resistance in local MRSA isolates. Around 35 Staphylococcus aureus locally isolated from different clinical specimens were employed in this study. Methicillin resistance was detected via cefoxitin disk diffusion and mecA amplification methods. MIC of gentamicin was estimated by broth microdilution method. Hemolysin genes involving hla, hlb, hld, and hlg were determined using multiplex polymerase chain reaction (PCR) technique. Microtiter plate method was employed for biofilm assessment in the presence and absence of gentamic
... Show MoreThe research aimed to identify smart management capabilities of secondary school principals in education directorates in Baghdad according to the administrative intelligent and leadership competencies. The study used incentives as a descriptive method, by analyzing five main areas of smart management: strategic planning, self-awareness, skills, organization and culture. A purposive sample consisting of 102 secondary school principals from education directorates (Rusafa1) and (Karkh2), was taken to fill questionnaire the latter representing a complete sample of the target population. validated has been built an advanced measurement tool composed of 56 items across the five domains of strategic planning (21%), self-awareness (21%), culture (2
... Show MoreThe aim of this study is to uncover the views of female students of Shaqra University towards midterm tests. A survey of (42) items distributed in three fields. The study has been applied to a random sample of (421) students from two faculties. The results showed that all three fields have achieved an intermediate level. The results also indicated that there were no statistically significant differences in students’ views of midterm tests due to the specialization or academic level variables.
In this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.