The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of which is the need for management to increase investment in information technology and monitor the financial allocations required to implement the comprehensive system according to a specific plan and schedule and monitor deviations in the application, their causes and ways to address them, with the need for the auditor to adopt an audit program in line with the size of the client's internal and external risks and analyze them to determine the risks that threaten the continuity of the client's activity and the size of the material misrepresentations. The remaining ones that extend to the financial statements.
A multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i
... Show MorePolymer concrete were prepared by mixing epoxy resin with sand particles in three different grain size (150-300) , (300-600 ) and (600- 1200) μm respectively. The percentage of epoxy was 15%, 20 %, 25% and 30% wt of the total weight. Compression strength and flexural strength tests were carried out for the prepared samples.
The percentages of epoxy resin at 20% wt and 25% wt showed best mechanical properties for all grain sizes. These percentages were adopted to fill the voids between particles sand have two different size ranges (150-600) μm and {(150-300) & (600-1200)} μm respectively to obtain more dense material. The results showed that the strength of polymer composite at 20% resin is higher than 25% resin.
The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThe Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is&
... Show MoreThe textbook is the primary means of creativity and thinking, which has a major role in the development of the readership and mental abilities of the student. It is the basic tool in education in Iraq for the teacher and the student, which cannot be dispensed in any educational program. The current study aimed at the book of the biology of the sixth grade of science in Iraq (comparative study). It was compared to the book of biology for the twelve grade in the Kingdom of Jordan to identify the ratio of similarity and differences between them, in addition, to identify the weaknesses in the Iraq curriculum and developing appropriate solutions and suggestions to address them. The sample was represented with books of biology (six-science cla
... Show MoreTwitter popularity has increasingly grown in the last few years, influencing life’s social, political, and business aspects. People would leave their tweets on social media about an event, and simultaneously inquire to see other people's experiences and whether they had a positive/negative opinion about that event. Sentiment Analysis can be used to obtain this categorization. Product reviews, events, and other topics from all users that comprise unstructured text comments are gathered and categorized as good, harmful, or neutral using sentiment analysis. Such issues are called polarity classifications. This study aims to use Twitter data about OK cuisine reviews obtained from the Amazon website and compare the effectiveness
... Show More