The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of which is the need for management to increase investment in information technology and monitor the financial allocations required to implement the comprehensive system according to a specific plan and schedule and monitor deviations in the application, their causes and ways to address them, with the need for the auditor to adopt an audit program in line with the size of the client's internal and external risks and analyze them to determine the risks that threaten the continuity of the client's activity and the size of the material misrepresentations. The remaining ones that extend to the financial statements.
Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Trickle irrigation is one of the most conservative irrigation techniques since it implies supplying water directly on the soil through emitters. Emitters dissipate energy of water at the end of the trickle irrigation system and provide water at emission points. The area wetted by an emitter depends upon the discharge of emitter, soil texture, initial soil water content, and soil permeability. The objectives of this research were to predict water distribution profiles through different soils for different conditions and quantify the distribution profiles in terms of main characteristics of soil and emitter. The wetting patterns were simulated at the end of each hour for a total time of application of 12 hrs, emitter disch
... Show MoreBackground: Management of immature permanent teeth with necrotic pulp is considered challenging to the clinician. Regeneration of pulp tissue is a relatively new approach for management of these teeth that allow continuation of root maturation rather than formation of just a calcific barrier as in apexification. Method: 9 years-old girl with traumatized upper left central incisor. The clinical and radiographical examinations revealed uncomplicated crown fracture, tenderness to percussion, absence of response to cold vitality test. Diagnostic X-ray revealed open apex with periapical radiolucency. Revascularization was suggested to treat the tooth, starting with irrigation of canal with 5% NaOCl + 3% H2O2, followed by 2 weeks of triple antibi
... Show MoreThe conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy
... Show MoreDeveloping an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal
... Show More