Preferred Language
Articles
/
whhZRZYBVTCNdQwCiYJt
Bank's Civil Liability for Money Laundering Operations
...Show More Authors

Summary money-laundering has been one of the most serious crimes affecting the national economy, including the private business sector, and it affects the moral system of society, as the beneficiaries of this process become the owners of the money-launderers that contribute to the investment activity by accumulating their accumulated wealth from Illegal economic activity. The biggest burden of money laundering is on banks, as they are the main channel in which money launderers pour their money, especially under bank secrecy laws, and banks are the first balaka in the fight against money laundering, in order to protect themselves from the risks Financial and legal responsibility for their participation in such operations, and certainly money-laundering is evolving in terms of means, so it is necessary to develop legal procedures in this regard. Therefore, efforts must be victorious between government institutions

Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Shell model and Hartree-Fock calculations of electron scattering form factors for 25Mg nucleus
...Show More Authors

Shell model and Hartree-Fock calculations have been adopted to study the elastic and inelastic electron scattering form factors for 25Mg nucleus. The wave functions for this nucleus have been utilized from the shell model using USDA two-body effective interaction for this nucleus with the sd shell model space. On the other hand, the SkXcsb Skyrme parameterization has been used within the Hartree-Fock method to get the single-particle potential which is used to calculate the single-particle matrix elements. The calculated form factors have been compared with available experimental data.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Effect of zinc oxid on the bentonite ability for removing Methylene blue from solution
...Show More Authors

A batch adsorption system was applied to study the adsorption of methylene blue from aqueous solution by Iraqi bentonite and treated bentonite with different amount of zinc oxide (ZnO). The adsorption capacities of methylene blue onto bentonite were evaluated. The equilibrium between liquid and solid phase was described by Langmuir model better than the Freundlich model. Langmuir and Freundlich constants have been determined. The separation factor or equilibrium parameter, RL which is used to predict if an adsorption system is favourable or unfavourable was calculated for all cases.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Neuroquantology
Finding Most Stable Isobar for Nuclides with Mass Number (165- 175) against Beta Decay
...Show More Authors

In the beta decay process, a neutron converts into a proton, or vice versa, so the atom in this process changes to a more stable isobar. Bethe-Weizsäcker used a quasi-experimental formula in the present study to find the most stable isobar for isobaric groups of mass nuclides (A=165-175). In a group of isobars, there are two methods of calculating the most stable isobar. The most stable isobar represents the lowest parabola value by calculating the binding energy value (B.E) for each nuclide in this family, and then drawing these binding energy values as a function of the atomic number (Z) in order to obtain the mass parabolas, the second method is by calculating the atomic number value of the most stable isobar (ZA). The results show

... Show More
Publication Date
Thu Jul 01 2010
Journal Name
International Journal Of Advancements In Computing Technology
Implementation of digital chaotic signal generator based on reconfigurable LFSRs for multiple access communications
...Show More Authors

This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec

... Show More
Scopus (3)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Physics: Conference Series
Gamma Irradiation Effects on Energy Transfer Parameters for Acrvlaven – Rhodamine19 Binary Laser Dye Mixtures
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Brazilian Dental Science
Actual dimensions, design, and fabrication of readymade posterior palatal seal for completely edentulous patients
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
Provisions for a Muslim to be naturalized with the citizenship of non-Muslim countries
...Show More Authors

Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment

And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-

Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in

... Show More
View Publication Preview PDF