Electronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exposed to various electronic crimes, especially money laundering crimes, so the challenge has become not in achieving the largest possible profits through the development of banking services, but in how to avoid the risks and losses resulting from that, so we will address in this study the various The motives that imposed the application of electronic automation in the field of banking services, as well as the risks facing the application process, through a statement of the challenges faced by banking institutions when applying the principles of electronic automation in the field of providing banking services in light of the necessity of change and the risks of development.
Background : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e
... Show MoreThis research revolves around the study of sports press coverage to the third African Youth Games that took place in Algeria from 19 to 28 July 2018. The games featured approximately 3000 athletes from 54 countries who competed in 27 sports. Five sports were qualified for the Youth Olympic Games in Argentina. The aim of this study was to analyze the content of the Algerian newspaper Ennahar El-Djadid by focusing on the discussions of various sports activities during the event. Thus, the descriptive approach and content analysis method were adopted for this research. They were used to highlight the newspaper's interest in this sports phenomenon. The chosen study samples were ten issue numbers of Ennahar El-Djadid newspaper
bjective researcher through this research to Put a theoretical framework to strategic orientation the center on the market in the business and the diagnosis and interpretation of the nature of the link between relationships and influencing strategic orientation dimensions Almtmthelh organizations (Entrepreneurial Orientation, market Orientation, Interaction Orientation) and the performance of the Iraqi Private Banks The research community and the level of dimensional and through the use of scale (Balanced Scorecard) Bmnzawradtha the four, the test of this research in the Iraqi banking sector (Gulf Commercial Bank
... Show MoreA groundwater quality assessment has been carried out in northeast part of Anbar governorate in western Iraq. We analyzed hydrochemical parameters such as pH, electrical conductivity, total dissolved solids presence of ions to describe groundwater quality. The study area has the only confined aquifer within the geological formation extended in area. Values of groundwater hydrochemical parameters were ranged from (7) to (7.9) for ph, (1599) to (6800) µmhos/cm for electrical conductivity (EC) and (1048) to (4446) mg/l for total dissolved solids (TDS). The origins and types of groundwater in the area were of marine origin and MgCl2 water type while only (6) samples were of continental origin and Na2SO4 wate
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreThe research aims to study Sabkha mineralogy to determine the mineral types, the nature of the precipitation, and the patterns of salt crystallization. Two Sabkhas in Abu Ghraib, west of Baghdad, were studied. It was found that the Sabkhas were formed in flat ponds from saturated solutions in a semi-arid to arid climate. Halite predominates, followed by anhydrite and gypsum as evaporite minerals. As for the minerals of the Sabkha soil, it consisted of feldspar, calcite, quartz, and dolomite, in addition to the clay minerals represented by kaolinite, illite, and chlorite. Needle forms, hopper shapes, dendritic crystals, and polygon shapes are the main crystallization patterns dominantly found in the Sabkhas. All these types of crysta
... Show More