E-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the theoretical framework. Six independent variables were identified to study the implementation of E-wallets, and a total of 500 respondents shared their opinions on retaining the usage of E-wallet in Malaysia. The data collected were analysed using SPSS for Pearson Correlation Analysis and Multiple Linear Regression. Out of the six variables, five independent variables were accepted, and one independent variable was rejected due to the greater significant level. The highest correlation coefficient falls under Business Resources with 0.704. The study delves into the implications and constraints, providing insights for the future advancement of E-wallets within the Malaysian context.
The researcher tackles the most outstanding conditions of experimentation, the importance of the study lies in being helpful to the workers in the field of theatre in general and directors in particular which the conditions of experimentation that should be taken.The study aims at knowing the experimental basis which the director (Sami Abdulhamid) followed in the realization of this.The researcher tackles in the First inquiry the concept of experimentation and the second tackles the conditions of experimentation.In the methodology of study the researcher analyzed the show of the "Othello in the Kitchen" and comes up to the following: 1. the dhows has cone with the nature of the previous shows experienced the methods that were not familia
... Show MoreBackground: During the pandemic, Corona virus forced many people, especially students, to spend more time than before on the computer and smartphone to study and communicate. The poor posture of the body may have worse effect on its body parts , most of which is the cervical spine (forward head posture). Objective: To assess the incidence of neck pain and the associated factors among undergraduate medical students related to position during E learning Subjects and Methods: Cross-sectional study was conducted among medical students in three Iraqi universities during 2021. The sample size was 152. Online questionnaire by Google forms sampling method were used to collect the data which was analysed using SPSS 25. Results: The perce
... Show More
Background: During the pandemic, Corona virus forced many people, especially students, to spend more time than before on the computer and smartphone to study and communicate. The poor posture of the body may have worse effect on its body parts , most of which is the cervical spine (forward head posture). Objective: To assess the incidence of neck pain and the associated factors among undergraduate medical students related to position during E learning Subjects and Methods: Cross-sectional study was conducted among medical students in three Iraqi universities during 2021. The sample size w |
Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show MoreIn Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show MoreSuffer most of the facilities of the high cost of inventory , which affects the high cost of the product and thus affects many administrative decisions , as well as suffer the facilities of the systems developed by the provisions of inventory control , and this problem is exacerbated in the construction sector where the inventory in the form of Construction spin of the Year for another it becomes difficult to control the cost effectively , and is the research problem in question follows: What are the implications of the use of the system in time inventory accounting system for the contracting company does kills Alrkaah to the provisions of the cost of inventory and what is the optimal approach to inventory control ? Find assumed
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreIn this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More