Preferred Language
Articles
/
jpgiafs-1262
Auditing the comprehensive electronic banking system to detect operational business risks (applied research)
...Show More Authors

Abstract:

                In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the customer's environment, and from here the research gained its importance by highlighting the reality of the application of the comprehensive electronic banking system in Rafidain Bank and identifying the nature of the external auditor's work in light of the client's application of electronic systems, and thus this research aims to provide a theoretical introduction to the comprehensive banking system, as well as to know the role of the auditor in light of the business risks surrounding the application of the system, The research reached a set of conclusions, most notably, the ability of the comprehensive banking system to develop and adapt banking operations more than other systems, which makes it a global solution for banks in the future due to the importance of the system and its ability to access multiple geographical areas and process operations in real time, and that the lack of preparation of an effective plan in advance for the transformation procedures towards the application of the comprehensive system in terms of providing infrastructure and qualified staffing and studying the problems of transformation and ways to solve them before the actual application of the system led to high operational risks. intrinsic, Therefore, the researcher proposed several recommendations, the most important of which is the need to increase investment in information technology with the development of a division for research and development of banking services provided by the comprehensive system in line with the development in the technological environment and the

needs and desires of customers to provide new and diverse banking services, with the need for the auditor to conduct an audit based on business risks in light of the customer's use of banking systems that rely on the Internet in providing his services, to control the size of current and future business risks that lead to failure Business or material misrepresentations extending to the financial statements.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 23 2020
Journal Name
Al-qadisiyah Journal Of Pure Science
The ESTIMATING MARRIAGE AND DIVORCES AND COMPARING THEM USING NUMERICAL METHOD. . .
...Show More Authors

In this paper, we describe the cases of marriage and divorce in the city of Baghdad on both sides of Rusafa and Karkh, we collected the data in this research from the Supreme Judicial Council and used the cubic spline interpolation method to estimate the function that passing through given points as well as the extrapolation method which was applied for estimating the cases of marriage and divorce for the next year and comparison between Rusafa and Karkh by using the MATLAB program.

Publication Date
Sat Sep 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancing the Lifting Capacity of Drilling Fluids in Vertical Oil Wells
...Show More Authors

Of the many functions that are performed by the drilling fluid, the most important is to transport cuttings from the bit up the annulus to the surface. Various drilling fluid have been widely used in the oil industry to improve lifting capacity. In this study, three mud type have been used which they are, oil base mud, X-anthan polymer and a mixture of CMC and bentonite ,by using Carrying Capacity Index  calculation (CCI) , the Xanthan  gave good values of CCI than other studied drilling fluid. By using Sifferman chart and field data from well in south of Iraq and API equation to find cutting concentration in the annulus, The results showed that the used of thick mud increase the lifting capacity and decrease volumetric drill c

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of cigarette smoking on salivary IgA and periodontal disease
...Show More Authors

Background: Chronic periodontitis is an inflammatory disease of tissues supporting the teeth. Salivary compositions have been most intensely studied as a potential marker for periodontal disease. In this study, analysis of saliva provides a simple and non-invasive method of evaluating the role of salivary IgA (s-IgA) levels in periodontal disease by detecting the level of (s-IgA) in patients with chronic periodontitis smokers and non smokers patients and correlate the mean (s-IgA) levels with clinical periodontal parameters Plaque index (PLI) gingival index (GI), probing pocket depth (PPD) and clinical attachment level (CAL). Materials and Methods: The study samples consists of (15) patients with chronic periodontitis who were non smokers (

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Classification of brain tumors using the multilayer perceptron artificial neural network
...Show More Authors

Information from 54 Magnetic Resonance Imaging (MRI) brain tumor images (27 benign and 27 malignant) were collected and subjected to multilayer perceptron artificial neural network available on the well know software of IBM SPSS 17 (Statistical Package for the Social Sciences). After many attempts, automatic architecture was decided to be adopted in this research work. Thirteen shape and statistical characteristics of images were considered. The neural network revealed an 89.1 % of correct classification for the training sample and 100 % of correct classification for the test sample. The normalized importance of the considered characteristics showed that kurtosis accounted for 100 % which means that this variable has a substantial effect

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
The International Journal Of Central Banking
THE ROLE OF DIGITAL TRANSFORMATION AND KNOWLEDGE BUILDING IN EDUCATIONAL INSTITUTIONS
...Show More Authors

This study aims at identifying the correlation between digital transformation and knowledge building in educational institutions, as well as finding the influence relationship between digital transformation and knowledge building in educational institutions and knowing the dimensions of digital transformation that have the most impact in improving the level of knowledge building, and by adopting the methodological descriptive analysis method in the Ministry of Education. Education and educational institutions in Baghdad. This research deals with digital transformation as an independent variable according to two dimensions (digital adaptability and digital readiness). Knowledge building was adopted as an approved variable using the s

... Show More
Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Applied Mathematics And Computation
Identification of the time-dependent conductivity of an inhomogeneous diffusive material
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Studying the impact of condensate blockage on gas production: A review
...Show More Authors

When the drawdown pressure amounts to a value below the dew point pressure, a minor droplet of condensate is shaped and accumulated in the close area of wellbore. As the accumulation happens, the saturation of the liquid will grow and a reduction in gas relative permeability will happen, therefore it will affect the productivity. Generally, condensate baking problem in gas wells is being deliberated and studied and numerous techniques have been suggested to solve the problem. The studying of condensate banking dynamics is essential to evaluate the productivity and behavior of the wells of the gas fields.

Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Nov 13 2020
Journal Name
Mechanics Of Advanced Materials And Structures
Enhancing the strength of reinforced concrete columns using steel embedded tubes
...Show More Authors

This paper demonstrates an experimental and numerical study on the behavior of reinforced concrete (RC) columns with longitudinal steel embedded tubes positioned at the center of the column cross-section. A total of 12 pin-ended square sectional columns of 150 × 150 mm having a total height of 1400 mm were investigated. The considered variables were the steel tube diameters of 29, 58, and 76 mm and the load eccentricity (0, 50, and 150) mm. Accordingly, these columns were divided into three groups (four columns in each group) depending on the load eccentricity (e) to column depth (h) ratio (e/h = 0, 1/3, and 1). For each group, one column was solid (reference), and the other three columns contained steel tubes with hollow rat

... Show More
Crossref (15)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Nasaq Journal
The Demonic Image of Autoimmunity in Dan Brown's Angels and Demons
...Show More Authors

Autoimmunity is a philosophical term that enhances the fields of life-sciences, and links out to the unnatural behaviour of an individual. It is caused by the defenses of an organism that deceive its own tissues. Obviously, the immune system should protect the body against invading cells with types of white blood cells called antibodies. Nevertheless, when an autoimmune disease attacks, it causes perilous actions like suicide. Psychologically, Jacques Derrida (1930-2004) calls autoimmunity a double suicide, because it harms the self and the other. In this case, the organ disarms betraying cells, as the immune system cannot provide protection. From a literary perspective, Derrida has called autoimmunity as deconstruction for over forty years

... Show More
View Publication Preview PDF