The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of which is the need for management to increase investment in information technology and monitor the financial allocations required to implement the comprehensive system according to a specific plan and schedule and monitor deviations in the application, their causes and ways to address them, with the need for the auditor to adopt an audit program in line with the size of the client's internal and external risks and analyze them to determine the risks that threaten the continuity of the client's activity and the size of the material misrepresentations. The remaining ones that extend to the financial statements.
The virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr
Cancer is in general not a result of an abnormality of a single gene but a consequence of changes in many genes, it is therefore of great importance to understand the roles of different oncogenic and tumor suppressor pathways in tumorigenesis. In recent years, there have been many computational models developed to study the genetic alterations of different pathways in the evolutionary process of cancer. However, most of the methods are knowledge-based enrichment analyses and inflexible to analyze user-defined pathways or gene sets. In this paper, we develop a nonparametric and data-driven approach to testing for the dynamic changes of pathways over the cancer progression. Our method is based on an expansion and refinement of the pathway bei
... Show MoreObjective(s): The present study aims at assessing the prevalence of smoking among health workers in Baghdad Teaching Hospital and to find out the effectiveness of instructional booklet concerning risk of smoking on health workers′ knowledge in hospital.
Methodology: A pre-experimental design study was conducted from 1st of October 2019 to 17th of March 2020. A non-probability sample consists of (500) participant (343 non-smokers and 157 smokers) from (1500) health workers in Baghdad Teaching Hospital, they included the physicians, nurses, pharmacists, physiotherapists, Laboratory Technicians, Medical Assistants. A questionnaire is constructed to evaluate the effectiveness of instructional booklet on health workers’ knowledge
The research aimed to explore the recall habits and developing the right recall habits at middle school students. A sample of (40) students were chosen intentionally from middle school students in two schools (almntzr- zany aleabdyn) with an average of (20) students from each school. They were evenly distributed in two experimental and control groups. To achieve the aims of the research, a scale was designed to measure the recall habits, and a preparation of an educational program to develop recall habits.
To process data statistically, the researcher used several statistical methods such as Pearson correlation coefficient, chi-square, T-test for one sample, T-test for two independent samples, Wilcoxon test, Mann-Whitney test, ET
... Show MorePlanning budgets are one of the methods used by the administration in controlling the elements of costs represented by (direct material costs, direct wage costs, and indirect manufacturing costs), and their importance lies in that they reflect what the activity of the economic unit should be in the future. In order to achieve the objectives of the economic unit and to solve this problem, the research was based on the following hypothesis (the role of planning budgets in controlling the elements of costs). , and thus the ability to reduce these costs and thus achieve profits by increasing sales and increasing market share, and the need to urge the state to support the company and the manufacturing sector, which helps and contributes
... Show MoreModeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreBackground: overweight and obesity are the fifth leadingrisk for global deaths. At least 2.8 million adults die eachyear as a result of being overweight or obese. Numerousstudies show that weight loss, even if only 5-10%,significantly improves dyslipidemia, hypertension, diabetesmellitus, risk for osteoarthritis and its symptoms and risk forselected cancers.Objectives: is to evaluate the effect of diet and exerciseprogram on anthropometric and biochemical status of adultobese patients.Methods: descriptive study. 124 adult obese patientsattending Al Kindy obesity research and therapy unit duringDecember 2012 were included. Measurement of Wt, heightHt and WC performed and BMI was calculated. Laboratorytest analysis, on the fasting state, w
... Show MoreThis study numerically intends to evaluate the effects of arc-shaped fins on the melting capability of a triplex-tube confinement system filled with phase-change materials (PCMs). In contrast to situations with no fins, where PCM exhibits relatively poor heat response, in this study, the thermal performance is modified using novel arc-shaped fins with various circular angles and orientations compared with traditional rectangular fins. Several inline and staggered layouts are also assessed to maximize the fin’s efficacy. The effect of the nearby natural convection is further investigated by adding a fin to the bottom of the heat-storage domain. Additionally, the Reynolds number and temperature of the heat-transfer fluid (HTF) are e
... Show More