The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of which is the need for management to increase investment in information technology and monitor the financial allocations required to implement the comprehensive system according to a specific plan and schedule and monitor deviations in the application, their causes and ways to address them, with the need for the auditor to adopt an audit program in line with the size of the client's internal and external risks and analyze them to determine the risks that threaten the continuity of the client's activity and the size of the material misrepresentations. The remaining ones that extend to the financial statements.
The proliferation of electronic games, video games and computers has caused children and teenagers to become attracted to these games and become their favorite entertainment. The widespread of these games has generated widespread debate about positive aspects and negative aspects. It is evident that there are two main trends in the impact of electronic games on the behavior of children and adolescents. The first trend is that e-games have positive effects on children and adolescents, especially in cognitive abilities and skills in learning. While the second view sees that electronic games have negative effects that appear in social isolation and lack of movement and aggression. Through the review of previous literature, the current resea
... Show MoreSoil movement resulting due unsupported excavation nearby axially loaded piles imposes significant structural troubles on geotechnical engineers especially for piles that are not designed to account for loss of lateral confinement. In this study the field excavation works of 7.0 m deep open tunnel was continuously followed up by the authors. The work is related to the project of developing the Army canal in the east of Baghdad city in Iraq. A number of selected points around the field excavation are installed on the ground surface at different horizontal distance. The elevation and coordinates of points are recorded during 23 days with excavation progress period. The field excavation process was numerically simulated by using the finite
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreObjective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physici
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThis study introduces a highly sensitive trapezium-shaped PCF based on an SPR refractometric sensor with unique design features. The structure of a sensor was designed and analyzed using COMSOL Multiphysics v5.6 based on Finite Element Method (FEM) with a focus on investigating the influence of various geometric parameters on its performance. The two channels were coated with a metallic gold layer to provide chemical stability, and a thin layer of TiO₂ improved the gold's adhesion to the fiber. The findings indicate that the proposed sensor achieves maximum amplitude and wavelength sensitivities of 1,779 RIU⁻¹ and 30,500 nm/RIU, respectively, with corresponding resolutions of 3.2