Concurrently with the technological development that the world is witnessing the crime of money laundering to evolve faster and with multiple methods and its economic, political and social impacts raised increasingly. And for phenomenon dangerous the international community in recent years is keen to be considered combating money laundering as a general indication whereby verification of the international response the stats and its banks and financial institutions with international requirements mandated in this aspect, so the increasing interest the governments of countries in the laws and procedures that contribute to the reduction of the phenomenon of money laundering and avoid legislation economy and the banking and financial sectors, the negative results that can be exposed. The research aims to identify the phenomenon of money laundering and the statement of stages and methods and patterns of criminal and sources of funds, and the statement of the procedures followed in the banks to reduce this phenomenon, as well as to identify the role of control and administrative authorities and the statement of the supervisory role of the Central Bank and its importance as a supervisory and control the banks and compliance in commitment to those procedures set forth by the International Organization recommendations (FATF Financial Action Task Force on Money Laundering- ) and confirmed by the law No. (93) for the year 2004 to combat money laundering operations. The research aims to identify as well as the International Standards Organization (FATF) recommendations concerning the obligations of financial institutions.In order to achieve the goal of the research, engaged the a researcher earlier studies and books and resources related to the subject exposed the theoretical side, the practical side has included the preparation of a series of questions based on the anti-money international standards laundering law materials, have included a sample search (Rasheed Bank, Rafidain Bank, Bank Iraqi Middle East Investment Bank of Baghdad). With the development of a proposed program to audit procedures to reduce the phenomenon of money laundering in the Iraqi commercial banks.The research has reached a number of conclusions and recommendations that have been developed in the light of its contribution to the development of audit procedures to reduce the phenomenon of money laundering in commercial banks, to activate the role of the internal control systems and activation procedures to identify the customer and knowledge of his activities and the adoption of anti-money laundering policy based on Iraqi law No. (93) of the combating money laundering for the year 2004 as well as the international Standards Organization FATF and find ways that enable the combating money laundering and avoid its negative effects on financial institutions and thus the country's economy.
This research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe current study was designed to remove Lead, Copper and Zinc from industrial wastewater using Lettuce leaves (Lactuca sativa) within three forms (fresh, dried and powdered) under some environmental factors such as pH, temperature and contact time. Current data show that Lettuce leaves are capable of removing Lead, Copper and Zinc ions at significant capacity. Furthermore, the powder of Lettuce leaves had highest capability in removing all metal ions. The highest capacity was for Lead then Copper and finally Zinc. However, some examined factors were found to have significant impacts upon bioremoval capacity of studied ions, where best biosorption capacity was found at pH 4, at temperature 50º C and contact time of 1 hour.
Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreAbstract
Objectives: The study aims to: (1) Find out the relationship among participants’ age, body mass index (BMI), and Health Belief Model (HBM) related to colorectal examinations among graduate students. (2) Investigate the differences in Health Belief Model constructs between the groups of age, gender, marital status, and education level among graduate students.
Methodology: A descriptive correlational study design which conducted in the College of Fine Arts – University of Baghdad. A convenience sample of 80 graduate students were included in this study. The data were collected by using a self-reported questionnaire which consisted of two parts (I) socio-demographic characteristics (II) Colorectal Cancer Screening Beliefs
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThis study was aimed to determine the mutations and single nucleotide polymorphisms (SNPs) in exon 3 and 7 of estrogen receptor beta (ESR2) gene in women with breast cancer from Iraq. Different samples (blood, fresh tissue with blood from same patient, and formalin fixed paraffin embedded, FFPE) were collected from women with breast cancer. Molecular analysis exon 3 and 7 in ESR2 has been studied by using PCR. It was found exon 3 and 7 in ESR2 were revealed as a single band with size 151 and 157 bp, respectively. There was no SNP in exon 3 has been identified. While three novel polymorphisms (ACT, AGG and GCA) were detected in exon 7, the type of those polymorphisms deletion for ACT and AGG while substitution polymorphism for GCA. From this
... Show More
Abstract
The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users of financial statements who depend on reported earnings in their deci
... Show MoreCongenital absence of anterior cruciate ligament is highly uncommon occurrence. It has since been documented as a standalone anatomical entity or, more frequently, in conjunction with other congenital anomalies. Surgical treatment for this patient population has only been reported in very few cases. In this article, we share our experience in managing a case of unilateral congenital deficiency of anterior cruciate ligament (ACL) in a 13 years old female patient by physeal sparing arthroscopic ACL reconstruction, using All-inside technique.