Preferred Language
Articles
/
jeasiq-779
Preventive measures for banking supervision on money laundering (Search in the Gulf Commercial Bank)
...Show More Authors

The research aims to study and assess the effectiveness of preventive measures banking for the reduction of money laundering based on the checklist (Check list), which have been prepared based on the paragraphs of some of the principles and recommendations of international and Money Laundering Act No. 93 of 2004 and the instructions thereto, to examine and assess the application of these measures by Gulf Commercial Bank, which was chosen to perform the search.

I've been a statement the concept of money laundering in terms of the definition and characteristics, stages and effects of political, economic and social as well as the nature of banking supervision in terms of the definition and the most important objectives and its importance was then assess the Bank's commitment to the chosen preventive measures control for the reduction of money laundering.

One of the most important conclusions that have been reached are not sufficient knowledge of some indicators of bank workers suspected some banking transactions , in addition to the weakness of the bank 's commitment to sample some preventive measures for the prevention and reduction of money - laundering operations .

The most important recommendations that the researcher recommended attention they should develop the skills of workers in the bank to pay attention to preventive measures in order to combat money laundering through rehabilitation and training , as well as the adoption of the Bank's management policies and mechanisms include the development of procedures for reporting any process suspected , as well as forcing employees to obtain full information about customers and identify their activities and their physical potential , with special tightening control on some of the activities and banking operations and movements of some accounts that arise around the doubts and private money transfers without obvious reasons .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of functional disability on lifestyle for patients with arthritis
...Show More Authors


A descriptive study, which was using an assessment approach, was conducted for the
determination of the impact of rheumatoid arthritis and osteoarthritis patient’s functional disability
upon their life style. The study was carried out at the Rheumatology and outpatients clinics of ALKarama
Teaching Hospital, Baghdad Teaching Hospital AL-Kindey Teaching Hospital and Specialized
surgeries Teaching Hospital for the period of October 15th 2003 through May 13th 2004 in Baghdad
City. A purposive (non-probability) sample of (245) arthritis patients which was comprised (111)
rheumatoid arthritis patients and (134) osteoarthritis patients, was selected out of the early stated
settings. The questionnaire was comprised of

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Ieee Access
On Computational Aspects of Tchebichef Polynomials for Higher Polynomial Order
...Show More Authors

View Publication
Scopus (52)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Influence of Fluoride Addition on Hydroxyapatite Prepared for Medical Applications
...Show More Authors

In this study, hydroxyapatite (HAP, Ca10(PO4)6(OH)2) has been prepared as bioceramic material with biological specifications useful to used for orthopedic and dental implant applications. Wet chemical processing seems to form the fine grain size and uniform characteristic nanocrystalline materials by the interstice factors controlling which affected the grain size and crystallinity in order to give good mechanical and/or constituent properties similar as natural bone. Fluorinated hydroxyapatite [4-6 wt% F, (FHA, Ca10(PO4)6(OH)2–Fx] was developed in new method for its posses to increased strength and to give higher corrosion resistance in biofluids than pure HAP moreover reduces the risk of dental caries. The phase's and functional groups

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Effect of growth regulators on responsible rooting for two varieties
...Show More Authors

Conducted two trials separate plants Defla first two seasons, 1998 and 1999 to test the susceptibility Altgveria three varieties including Azharha colored white and pink Qati and pink Qtmr and second seasons 1999 and 2000, two types color Azhaarhama white and pink Qati treated mind half-timbered two types of Alaoxinat IBA and NAA and three concentrations as well as repeatersAdhrt results low Almaah rooting

View Publication Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref