Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exposed to various electronic crimes, especially money laundering crimes, so the challenge has become not in achieving the largest possible profits through the development of banking services, but in how to avoid the risks and losses resulting from that, so we will address in this study the various The motives that imposed the application of electronic automation in the field of banking services, as well as the risks facing the application process, through a statement of the challenges faced by banking institutions when applying the principles of electronic automation in the field of providing banking services in light of the necessity of change and the risks of development.
Abstract
The current research aims to identify the level of E-learning among middle school students, the level of academic passion among middle school students, and the correlation between e-learning and academic passion among middle school students. In order to achieve the objectives of the research, the researcher developed two questionnaires to measure the variables of the study (e-learning and study passion) among students, these two tools were applied to the research sample, which was (380) male and female students in the first and second intermediate classes. The research concluded that there is a relationship between e-learning and academic passion among students.
Carbon fibre reinforced polymers are widely used to strengthen steel structural elements. These structural elements are normally subjected to static, dynamic and fatigue loadings during their life-time. A number of studies have focused on the characteristics of CFRP sheets bonded to steel members under static, dynamic and fatigue loadings. However, there is a gap in understanding the bonding behaviour between CFRP laminates and steel members under impact loading. This paper shows the effect of different load rates from quasi-static to 300 × 103 mm/min on this bond. Two types of CFRP laminate, CFK 150/2000 and CFK 200/2000, were used to strengthen steel joints using Araldite 420 epoxy. The results show a significant bond strength enhancemen
... Show MoreThis search concerns study the crack growth in the wall of pipes made of low carbon steel under the impact load and using the effect of moisture (rate of moisture 50%). The environmental conditions were controlled using high accuracy digital control with sensors. The pipe has a crack already. The test was performed and on two type of specimens, one has a length of 100cm and other have length 50cm. The results were, when the humidity was applied to the pipe, the crack would enhance to grow (i.e. the number of cycles needed to grow the crack will reduce). In addition, when the test performed on the specimens of length 50cm the number of cycles needed to grow the crack is increased due to the effect of bending stress on the
... Show MoreIn this study, a different design of passive air Solar Chimney(SC)was tested by installing it in the south wall of insulated test room in Baghdad city. The SC was designed from vertical and inclined parts connected serially together, the vertical SC (first part) has a single pass and Thermal Energy Storage Box Collector (TESB (refined paraffin wax as Phase Change Material(PCM)-Copper Foam Matrix(CFM))), while the inclined SC was designed in single pass, double passes and double pass with TESB (semi refined paraffin wax with copper foam matrix) with selective working angle ((30o, 45o and 60o). A computational model was employed and solved by Finite Volume Method (FVM) to simulate the air i
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAbstract: The aim of the current research is to identify (the relationship between deep understanding skills and mathematical modeling among fifth grade students) the research sample consisted of (411) male and female students of the fifth grade of biology distributed over the General Directorates of Education in Baghdad / Al-Rusafa / 2 / and Al-Karkh / 1 /, and two research tools were built: 1- A test of deep understanding skills, consisting of (20) test items and a scale for two skills. 2- The second test consists of (24) test items distributed among (18) essay items and (6) objective items. The psychometric properties of validity, stability, discriminatory strength, and effectiveness of alternatives were verified for the two tests fo
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show More