Receive money laundering phenomenon of interest to researchers and scholars on different intellectual orientation of economic or political or other, as this process is gaining paramount importance in light of business and increase the number of banks in the province of Kurdistan of Iraq and Erbil in particular and in the presence of openness developments chaotic economic and there are no factors encourage money laundering operation because of the presence of the hidden economy and the weakness of the banking and legal measures to combat them, and on this basis there is a need to examine money laundering operation in the province of Arbil, to indicate the presence or absence of a money laundering operation in working in the province of Arbil, the banks, where the results showed a spread of this phenomenon is due to the lack of attention to the sources of funds and the existence of administrative difficulties and banking and difficulties in gathering information and weak managerial competencies and banking, as well as the lack of controls to inquire about the sources of funds, and the lack of a specific law to combat money laundering. The research found a number of recommendations that emphasize the need for the legislation of a national law to combat money laundering as well as the need to activate international cooperation in the fight against money laundering and making the most of the experiences of some developed countries.
Tillage appearance device is mechanical, electric-electronic design, getting Patent from the Central Organization for Standardization and Quality Control – Industrial Property Department - Ministry of Planning – The Republic of IRAQ under number Patent 3876 in 20 / 4 / 2014, calculates the number of clods per area by Tillage appearance device, This is done through the generation electrical impulses are sent to the controlled accurate calculates number clods required space and shows the result on the screen in order to see the tillage view per area. Three factor used in these experiment, first factor represents forward speed of tractor three levels (3.5, 4.5, and 5.5 km/h), second factor represent soil moisture content at two levels (14
... Show MoreAmong a collection of leafhoppers from Erbil Province in Kurdistan/Iraq, a new species of the genus Arboridia Zakhvatkin, 1946 was designated and described here as a new species to the science. The erection of this species was mainly built on the external characters included the male genitalia. Sites and dates of collections so as the host-plants were verified.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreEco-friendly concrete is produced using the waste of many industries. It reduces the fears concerning energy utilization, raw materials, and mass-produced cost of common concrete. Several stress-strain models documented in the literature can be utilized to estimate the ultimate strength of concrete components reinforced with fibers. Unfortunately, there is a lack of data on how non-metallic fibers, such as polypropylene (PP), affect the properties of concrete, especially eco-friendly concrete. This study presents a novel approach to modeling the stress-strain behavior of eco-friendly polypropylene fiber-reinforced concrete (PFRC) using meta-heuristic particle swarm optimization (PSO) employing 26 PFRC various mixtures. The cement was partia
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
Abstract Objective: The underlying molecular basis of ischemic heart diseases (IHDs) has not yet been studied among Iraqi people. This study determined the frequency and types of some cardiovascular genetic risk factors among Iraqi patients with IHDs. Methods: This is a cross-sectional study recruiting 56 patients with acute IHD during a 2-month period excluding patients >50 years and patients with documented hyperlipidemia. Their ages ranged between 18 and 50 years; males were 54 and females were only 2. Peripheral blood samples were aspirated from all patients for troponin I and DNA testing. Molecular analysis to detect 12 common cardiovascular genetic risk factors using CVD StripAssay® (ViennaLab Diagnostics GmbH, Austria) was performed
... Show MoreThis study thoroughly investigates the potential of niobium oxide (Nb2O5) thin films as UV-A photodetectors. The films were precisely fabricated using dc reactive magnetron sputtering on Si(100) and quartz substrates, maintaining a consistent power output of 50W while varying substrate temperatures. The dominant presence of hexagonal crystal structure Nb2O5 in the films was confirmed. An increased particle diameter at 150°C substrate temperature and a reduced Nb content at higher substrate temperatures were revealed. A distinct band gap with high UV sensitivity at 350 nm was determined. Remarkably, films sputtered using 50W displayed the highest photosensitivity at 514.89%. These outstanding optoelectronic properties highlight Nb2O5 thin f
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More