This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity Distribution (GCBED) of Baghdad, owned by the Iraqi federal government. The Statistical Package for the Social Sciences (SPSS) software was employed to analyse the data and hypotheses. The study concluded that there is a substantial effect on the performance of EIA depending on the COBIT framework in reducing electronic audit risk in GCBED. According to the findings, additional research should be undertaken to improve efficiency, accounting control efficiency, and asset protection programs to lessen audit risk.
Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreStatic loads exposing to mechanical components can cause cracks, which are lead to form stress concentration regions causing the failure of structure. Generally, from 80% to 90% of structure failure is due to initiation of the cracks. Therefore, it is necessary to repair the crack and reduce its effect on the structure where the effect of the crack is modelled as an additional flexibility to the structure. In the last few years, piezoelectric materials have been considered as one of the most favourable repairing techniques. The piezoelectric material converts the applied voltage on it to a bending moment to counter the bending moment caused by the external load on the beam at the crack location. In this study, the design of the piez
... Show More<span lang="EN-US">Proper employment of Hybrid Wind/ PV system is often implemented near the load, and it is linked with the grid to study dynamic stability analysis. Generally, instability is because of sudden load demand variant and variant in renewable sources generation. As well as, weather variation creates several factors that affect the operation of the integrated hybrid system. So this paper introduces output result of a PV /wind via power electronic technique; DC chopper; that is linked to Iraqi power system to promote the facilitating achievement of Wind/ PV voltage. Moreover, PSS/E is used to study dynamic power stability for hybrid system which is attached to an effective region of Iraqi Network. The hybrid system
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThe research aims to identify the academic problems of family counseling diploma students at Saudi Universities. In addition, to identify the differences in these problems according to gender, marital status, place of study, academic specialization, and GPA. The sample consisted of (491) students. The researcher has used one questionnaire for academic problems prepared by the researcher. The research revealed the following results: There were academic problems among family counseling diploma students at Saudi Universities, the most problems were related to the systems and administrations of the university, then the field training, the buildings, classrooms and campus facilities, then the academic courses, after that the exams, then
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show More