Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exposed to various electronic crimes, especially money laundering crimes, so the challenge has become not in achieving the largest possible profits through the development of banking services, but in how to avoid the risks and losses resulting from that, so we will address in this study the various The motives that imposed the application of electronic automation in the field of banking services, as well as the risks facing the application process, through a statement of the challenges faced by banking institutions when applying the principles of electronic automation in the field of providing banking services in light of the necessity of change and the risks of development.
Recently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThe research is aimed at investigating how the New York Times framed the war against ISIS in its news coverage and which news sources it adopted while reporting on this war.
The research could be classified under descriptive researches. The survey methodology has been adopted and the content analysis has been used. The research sample consists of all the news stories the New York Times have published about the war against ISIS from 10/17/2016 to 4/16/2017 according to the comprehensive sampling method. The number of news stories that were analyzed was (155) news story. The research tool was (coding scheme).
The research has reached the following conclusions:
1. In its news coverage of the war against ISIS, the New York T
Numerical Investigation was done for steady state laminar mixed convection and thermally and hydrodynamic fully developed flow through horizontal rectangular duct including circular core with two cases of time periodic boundary condition, first case on the rectangular wall while keeping core wall constant and other on both the rectangular duct and core walls. The used governing equations are continuity momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C.) methods. The Finite Difference approach with the Line Successive Over Relaxation (LSOR) method is used to obtain all the computational results the (B.F.C.) method is used to generate th
... Show More