Concurrently with the technological development that the world is witnessing the crime of money laundering to evolve faster and with multiple methods and its economic, political and social impacts raised increasingly. And for phenomenon dangerous the international community in recent years is keen to be considered combating money laundering as a general indication whereby verification of the international response the stats and its banks and financial institutions with international requirements mandated in this aspect, so the increasing interest the governments of countries in the laws and procedures that contribute to the reduction of the phenomenon of money laundering and avoid legislation economy and the banking and financial sectors
... Show MoreA problem of solid waste became in the present day common global problem among all countries, whether developing or developed countries, and can say that no country in the world today is immuning from this dilemma which must find appropriate solutions. The problem has reached a stage that can not ignore or delay, but has became a daily problem occupies the minds of ecologists, economists and politicians took occupies center front in the lists of priorities for the countries in terms of finding solutions to the rapid scientific and radical them. and that transport costs constitute an important component of total costs borne by the municipal districts in the process of disposal of solid waste, so any improvement in the
... Show MoreCoronavirus disease (COVID-19) is an acute disease that affects the respiratory system which initially appeared in Wuhan, China. In Feb 2019 the sickness began to spread swiftly throughout the entire planet, causing significant health, social, and economic problems. Time series is an important statistical method used to study and analyze a particular phenomenon, identify its pattern and factors, and use it to predict future values. The main focus of the research is to shed light on the study of SARIMA, NARNN, and hybrid models, expecting that the series comprises both linear and non-linear compounds, and that the ARIMA model can deal with the linear component and the NARNN model can deal with the non-linear component. The models
... Show MoreThe study examines the religious references of the art of miniatures in the Iranian school "Bahzad model" completed in Iran during the twelfth century AH, according to the controls and characteristics of the authoritative references. The researcher presented the problem of research, its importance, the need for it and its purpose, defined the terms in the research. The theoretical framework came with three investigations. The first topic of the concept of the reference in the field of knowledge, which concluded the most important features of the reference, is that each symbolic existence corresponds to a real existence and symbolic presence is an input to the realization of the reference. The reference then becomes a sign that acts as a
... Show MoreA simple straightforward mathematical method has been developed to cluster grid nodes on a boundary segment of an arbitrary geometry that can be fitted by a relevant polynomial. The method of solution is accomplished in two steps. At the first step, the length of the boundary segment is evaluated by using the mean value theorem, then grids are clustered as desired, using relevant linear clustering functions. At the second step, as the coordinates cell nodes have been computed and the incremental distance between each two nodes has been evaluated, the original coordinate of each node is then computed utilizing the same fitted polynomial with the mean value theorem but reversibly.
The method is utilized to predict
... Show MoreBackground: Thyroid surgery is most common endocrine surgery in general surgical practice. Objectives: the aim of this work is to evaluate the feasibility, benefits and outcomes of open mini-incision thyroidectomy and compared the results with that of conventional thyroidectomy. The comparison between the two groups was in term of incision length, amount of blood loss, time of operation, postoperative pain, hospital stay and the cosmetic outcomes.Type of the study: this is a single-blinded randomized controlled studyMethods: This study compared the advantages and outcomes of 22 patients subjected to mini-incision thyroidectomy (Group A) with the equal numbers of patients subjected to conventional thyroidectomy (Group B).Results: the oper
... Show MoreAbstract:
The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.
A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More