The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of which is the need for management to increase investment in information technology and monitor the financial allocations required to implement the comprehensive system according to a specific plan and schedule and monitor deviations in the application, their causes and ways to address them, with the need for the auditor to adopt an audit program in line with the size of the client's internal and external risks and analyze them to determine the risks that threaten the continuity of the client's activity and the size of the material misrepresentations. The remaining ones that extend to the financial statements.
Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MorePorous materials play an important role in creating a sustainable environment by improving wastewater treatment's efficacy. Porous materials, including adsorbents or ion exchangers, catalysts, metal–organic frameworks, composites, carbon materials, and membranes, have widespread applications in treating wastewater and air pollution. This review examines recent developments in porous materials, focusing on their effectiveness for different wastewater pollutants. Specifically, they can treat a wide range of water contaminants, and many remove over 95% of targeted contaminants. Recent advancements include a wider range of adsorption options, heterogeneous catalysis, a new UV/H2O
United Arab of Emirates made efforts in developing workforce in the field of nuclear energy that it had a chance to attract specialized of this field that it reflect growth in every field of life through which it take special procedures to face casas as fokoshima .the state had started to apply the UAE peaceful nuclear program by opening (Baraka)station in 2010 as to be the first in the Arab world to aim to enhance and diversification energy sources of electricity there in addition to enhance the state’s efforts to achieve economic refreshing and environmental protect.
In this paper the effect of mixing TiO2 nanoparticles with epoxy resin is studied. The TiO2 nanoparticles would be synthesis and characterized by scanning electron microscopy (SEM), XRD FTIR, for two particle sizes of 50 and 25 nm. The thermal conductivity is measured with and without composite epoxy resin; the results showed that the thermal conductivity was increased as nanoparticle concentration increased too. The thermal conductivity was increased as particle size decreased.
The study of homomorphisms in cubic sets is considered one of the important concepts that transfer algebraic properties between different structures, so we study a homomorphism of a cubic set of a semigroup in a KU-algebra and defined the product of two cubic sets in this structure. Firstly, we define the image and the inverse image of a cubic set in a KU-semigroup and achieve some results in this notion. Secondly, the Cartesian product of cubic subsets in a KU-semigroup is discussed and some important characteristics are proved.
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThe highest incidence of injury is seen in adolescent playing pivoting sports such as soccer, basketball, and handball. Objective: To examine the effectiveness of a neuromuscular prevention program in reducing knee and ankle injuries in adolescent male soccer players.
Abstract
The research has discussed the public relations as dependent variable of its branch dimensions( confidence , commitment, control and satisfaction ) and the governmental service quality as independent variable of its branch dimensions (response, dependency, emphasis, tangibility and sympathy), and the research problem has represented by weakness of service quality presented to the customers dealing with company, which is observed via field co-existence of the researcher, where he observe that the quality presented in the company services, are inappropriate with the customers expectations level, also there is weakness of attention and recognition by the
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More