Preferred Language
Articles
/
jpgiafs-95
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخذ بنظر الاعتبار ماجاء بمقررات بازل لادارة المخاطر المصرفية الالكترونية , فضلا عن متطلبات اطار COBIT في ظل بيئة تقنية المعلوماتلفحص هذا النظام في اجراء التحويلات المالية للتأكد من صحتها وشرعيتها.حيث يهدف البحث الى فحص مدى كفاءة وفاعلية هذا النظام في اجراء التحويلات المالية الآمنة وبالتالي الحفاظ على المال العام من الهدر والضياع .

وتم التوصل الى مجموعة من الاستنتاجات أبرزها:

1-عدم وجود برنامج تدقيقي لدى ديوان الرقابة المالية الاتحادي لفحص نظام مقاصة الصكوك الالكترونية (ACH) المطبق في المصارف الحكومية.

2-ضعف البنى التحتية لتقانة المعلومات للمصارف الحكومية المشاركة بنظام مقاصة الصكوك الالكترونية(ACH) والتي ما زالت في طور الاكتمال.

وقد قدم البحث عدداً من التوصيات منها:

1-ضرورة تبني برنامج التدقيق المقترح لغرض فحص نظام مقاصة الصكوك الالكترونية (ACH) المطبق في المصارف الحكومية من قبل ديوان الرقابة المالية الاتحادي. 

2-تعزيز البنى التحتية لتقانة المعلومات للمصارف الحكومية المشاركة بنظام مقاصة الصكوك الالكترونية(ACH) والعمل على تطويرها.

Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Proposed Modification to Increase Main Swept Back Wing Efficiency for Aircraft Aermacchi Siai S211
...Show More Authors

A winglet is devices attached at the wing tips, used to improve aircraft wing efficiency by reduction influence wing tips vortices and induct drag, increasing lift force at the wing tips and effective aspect ratio without adding greatly to the structural stress and weight in the wing structure. This paper is presented three-dimensional numerical analysis to proposed modification swept back wing by adding Raked winglets devices at the main wing tips belong the two seat trainer aircraft type Aermacchi Siai S211 by using Fluent ANSYS 13 software. CFD numerical analysis process was performed at the same flight boundary conditions indifferent wing angle of attacks with constant air flow velocity V∞ =50 (m/sec), ambient pressure Po=101325 (P

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the proposed strategy of Maysan Oil Company for the years 2020-2024
...Show More Authors

ناقش البحث في طياته عدداً من القضايا الرئيسة المتعلقة بالتقييم الاستراتيجي والإطار العام للخطة الاستراتيجية المقترحة لشركة نفط ميسان للسنوات الخمس المقبلة (2020_2024)، وهدف هذا البحث يتمحور في تقييم عملية صياغة استراتيجية شركة نفط ميسان لتحديد نقاط القوة وتعضيدها ومواطن الضعف ومحاولة معالجتها لتجنب الوقوع بها عند وضع استراتيجية للسنوات القادمة، وعلى هذا الاساس فان مشكلة البحث تكمن في مدى نجاح الاستراتي

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
A New Structure for Cascaded Single-Stage Distributed Amplifier Using Proposed Active Inductor Loads
...Show More Authors

A modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.

View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Risks of Audit under Environment of Information Technology
...Show More Authors

Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronicall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 19 2018
Journal Name
Elmofaker Review
Secondary liability for electronic auctions arising from the contribution to trademark infringement
...Show More Authors

Despite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit

... Show More
View Publication
Publication Date
Thu Jul 01 1999
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
parasites of the house fly Musca domestica L. (Distera , Muscidae) in Iraq
...Show More Authors

Eleven species of parasitic insects were recovered from puparia of house fly Musca domestica L. developing in animal dung in Baghdad during 1985-1987. Of the parasites obtained, representatives were found in five families of Hymenoptera and one family of Coleoptera. The most prevalent parasites were Spalangia cameroni Perkins, S. nigroaenea Curtis and S. endius Walk. Average parasitism for the two year was 11.30 %, the highest number of parasitism occurred in May and October.

View Publication Preview PDF
Publication Date
Thu Jun 02 2016
Journal Name
Alustath Journal For Human And Social Sciences
Islamic Electronic Libraries and The service for downloading Research and Comic books (PDF): An Evaluation study
...Show More Authors

The research aims to evaluate Islamic electronic libraries and their service for downloading research and illustrated books, explaining their origins, features and types. The research was limited to the libraries available on the Internet that provide the service for downloading research and illustrated books. The researcher relied on the survey approach to identify the libraries and a sample of them (20 libraries) was selected. For the purpose of evaluating it according to five criteria related to the preparation and publication of Islamic electronic libraries (the responsible party, the goals and objectives, the year, the services it provides, the sections and subject specializations of its contents) and five criteria related to the servi

... Show More
View Publication Preview PDF