Due to technological developments in the Iraqi banking sector, which is the use of electronic payment systems within the banking infrastructure. This has led to speed and accuracy in the completion of transactions, reduced costs, increased revenues and efficiency. This research examines the challenges and risks facing the Iraqi banking sector as a result of its use of electronic payment systems. And show its impact on the profitability of commercial banks. The research was based on the main hypothesis that there is a statistically significant moral impact relationship between electronic payment systems and the profitability of banks. Iraqi commercial banks were chosen as a research community, All Iraqi commercial banks that participate in each of the immediate Real Time Gross settlement system (RTGS), the Automated clearing House system (ACH) and the retail payment system infrastructure (RPSI) have been listed. Based on data obtained from the Central Bank of Iraq and some banks, the research sample was identified, which includes AL-Rafidain Bank, National Bank of Iraq, Ashur International Bank and The International Development Bank. From the statistical analysis of the research variables, the results of the analysis and measurement showed a statistically significant moral effect relationship between electronic payment systems and the profitability of commercial banks sample research. The more commercial banks use electronic payment systems to complete their transactions, the profitability of these banks has increased. The research recommended the need to increase investment by banks on the infrastructure of electronic payment systems, as they should be reliable, cost-effective and accessible from the majority of the community, which positively affects profitability.
Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o
... Show MoreThe reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i
... Show MoreMicroservice architecture offers many advantages, especially for business applications, due to its flexibility, expandability, and loosely coupled structure for ease of maintenance. However, there are several disadvantages that stem from the features of microservices, such as the fact that microservices are independent in nature can hinder meaningful communication and make data synchronization more challenging. This paper addresses the issues by proposing a containerized microservices in an asynchronous event-driven architecture. This architecture encloses microservices in containers and implements an event manager to keep track of all the events in an event log to reduce errors in the application. Experiment results show a decline in re
... Show MoreThis paper aims at providing the teaching staff members with the necessary skills so as to become capable of tackling various situations, and treating daily problems that face students learning Spanish as a Second Language. This is made as an attempt to make teachers of foreign languages in general acquainted with modern trends of teaching with less complicated methods, specifically in teaching e earlier stages of foreign languages.
Abstracto:
En el presente trabajo pretendemos dotar al docente no nativo de Lenguas extranjeras, con algunos de los métodos necesari
... Show Moreנושא הדאיקסיס בצורה כללית הוא אחד הנושאים הלשוניים החשובים, הנושא הזה שייך לתחום הפרגמאטיקה, חשיבותו טמונה בכך שהוא אמצע הבעה חשוב בחיי היומיום שלנו, מכיוון שהוא נחשב אחד מאמצעי התקשורת בין האנשים. נושא זה קשור בקשר הדוק בהקשר, משום שהוא עוזר להסיר הדו-משמעות שבאמצעותו אנו מגיעים לרפרנטים המכוונים בצורה מדוייקת.
Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreRecently personal recommender system has spread fast, because of its role in helping users to make their decision. Location-based recommender systems are one of these systems. These systems are working by sensing the location of the person and suggest the best services to him in his area. Unfortunately, these systems that depend on explicit user rating suffering from cold start and sparsity problems. The proposed system depends on the current user position to recommend a hotel to him, and on reviews analysis. The hybrid sentiment analyzer consists of supervised sentiment analyzer and the second stage is lexicon sentiment analyzer. This system has a contribute over the sentiment analyzer by extracting the aspects that users have been ment
... Show MoreThere continues to be a need for an in-situ sensor system to monitor the engine oil of internal combustion engines. Engine oil needs to be monitored for contaminants and depletion of additives. While various sensor systems have been designed and evaluated, there is still a need to develop and evaluate new sensing technologies. This study evaluated Terahertz time-domain spectroscopy (THz-TDS) for the identification and estimation of the glycol contamination of automotive engine oil. Glycol contamination is a result of a gasket or seal leak allowing coolant to enter an engine and mix with the engine oil. An engine oil intended for use in both diesel and gasoline engines was obtained. Fresh engine oil samples were contaminated with fou
... Show MoreThe cloud-users are getting impatient by experiencing the delays in loading the content of the web applications over the internet, which is usually caused by the complex latency while accessing the cloud datacenters distant from the cloud-users. It is becoming a catastrophic situation in availing the services and applications over the cloud-centric network. In cloud, workload is distributed across the multiple layers which also increases the latency. Time-sensitive Internet of Things (IoT) applications and services, usually in a cloud platform, are running over various virtual machines (VM’s) and possess high complexities while interacting. They face difficulties in the consolidations of the various applications containing heterog
... Show More