The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of which is the need for management to increase investment in information technology and monitor the financial allocations required to implement the comprehensive system according to a specific plan and schedule and monitor deviations in the application, their causes and ways to address them, with the need for the auditor to adopt an audit program in line with the size of the client's internal and external risks and analyze them to determine the risks that threaten the continuity of the client's activity and the size of the material misrepresentations. The remaining ones that extend to the financial statements.
The palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.
Construction is a complicated process that takes place in an almost uncontrollable environment. Although projects can be carefully planned in advance in principle, there is a chance that unforeseen events and crises can disrupt these plans, affecting project development. Because the initial investment expenditures in construction projects are so large, they may be quickly influenced by crises, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which significantly impacted various activities in general and the construction industry in particular. Despite the importance of crisis management systems, the researchers found a great lack of local studies l
... Show MoreThe aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreObjective(s): to assess the effectiveness of educational program on nurses' knowledge concerning the side
effects of chemotherapy among children with leukemia.
Methodology: A descriptive analytic (quasi – experimental) design study was carried out at Baghdad City from
2
nd of October to 27th of June 2015. Non-probability sample of (35) male and female nurses was selected from
the Oncology Wards in Children Welfare, Child's Central and Baghdad Teaching Hospital. The study
instruments consisted of two major parts to meet the purposes of study. The first part is related to nurses'
demographic characteristics and the second part (four domains) is related to nurses' knowledge concerning the
side effects of chemothera
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreAbstract
The present search addressed the "strategic Vigilance and their impact in Organizational success "Where has the objective of strategic Vigilance and Organizational success of increasing importance at the present time, for being fairly modern topics, which have a tremendous impact on the success of organizations. &
... Show MoreGlobal services with an agent or a multi-agent system are a promising and new research area. However, several measures have been proposed to demonstrate the benefits of agent technology by supporting distributed services and applying smart agent technology in web dynamics. This paper is designed to build a Semantic Web on the World Wide Web (WWW) to enhance the productivity of managing electronic library applications, which poses a problem to researchers and students, represnted by the process of exchanging books from e-libraries, where the process is slow or the library needs large system data.
Nowadays, most of the on-chip plasmonic single-photon sources emit an unpolarized stream of single photons that demand a subsequent polarizer stage in a practical quantum cryptography system. In this paper, we numerically demonstrated the coupling of the light emitted from a quantum emitter (QE) at 700 nm wavelength to the propagation mode supported by an on-chip hybrid plasmonic waveguide (HPW) polarization rotator. Our results proved that the light emitted is linearly polarized at 0º, 45º/−45º, and 90º with propagation lengths of 5 μm, 3.3 μm, and 3.9 μm, respectively. Moreover, high power-conversion efficiency was obtained from an applied transverse magnetic (TM) mode (0º-polarization) to a transverse electric (TE) (90º-polari
... Show More