The current research aimed to identify the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis. It also aims to identify the recovery and resuming plan to the business environment. The research followed the descriptive survey to find out the views of 34 internal auditors at various functional levels in the Kingdom of Saudi Arabia. Spreadsheets (Excel) were used to analyze the data collected by a questionnaire which composed of 43 statements, covering the tasks that the internal auditors can perform to face the COVID-19 crisis. Results revealed that the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis is to ensure that the plan meets the instructions issued by the government, the Ministry of Health and the World Health Organization, and they performed some tasks remotely before the crisis took place. The most apparent tasks performed by the internal auditors when implementing the business continuity work we're carrying out the tasks using some technological audit devices and recent apps to overcome new working conditions. Other tasks were performed were to participate in the provision of emergency services outside the scope of their work at the request of executive departments and to make major modifications to the risk-based internal audit plan, aiming at evaluating new activities and covering aspects of risk during the COVID-19 crisis. To recover from the COVID-19 crisis and return to the business environment, the internal auditors involved in evaluating the commitment to implement the precautionary measures and recommend following-up alternative procedures for some departments to restore business after the negative impact of organizations resources.
This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreTransit agencies constantly need information about system operations and passengers to support their regular scheduling and operation planning processes. The lack of these processes and cultural motivations to use public transportations contributes enormously to the reliance on the private cars rather than public transportation, resulting in traffic congestions. The traffic congestions occur mainly during peak hours and the accidents happening as a result of road accidents and construction works. This study investigates the effects of weekday and weekend travel variability on peak hours of the passenger flow distribution on bus lines, which can effectively reflect the degree of traffic congestion. A study of passen
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreThe nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.
The concept of education is not actually restricted to children or school students, but rather every person should be educated and followed up if he is intended to grow and prove, with effort and time allocation as to fulfill that goal. Thus , the current paper aims to a thinking education and to educate that thinking in teacher and it is not new to deal with the personal characteristics of teacher in the different scientific , and educational researches . But ,these research did not address the necessity of acquiring the skill of thinking, especially as it affects teacher's presentation of the content of the curriculum or even content outside the curriculum, and therefore, there is n
... Show MoreEmpirical equation has been presented to predict the optimum hydrodynamic
pressure gradient with optimum mud flow rate (one equation) of five Iraqi oil wells
to obtain the optimum carrying capacity of the drilling fluid ( optimum transport
cuttings from the hole to the surface through the annulus).
This equation is a function of mud flow rate, mud density and penetration
rate without using any charts or graphs.
The correlation coefficient accuracy is more than 0.9999.
Background: Fractures of the humeral shaft
accounting for approximately 3% of all
fractures. There is a wide array of good
options for their treatment and controversy
over the best methods. Although good
techniques of osteosynthesis are available, the
aim of this article is toemphasize on the benefit
and good outcome of conservative treatment
for properly selected cases to decrease the cost
and avoid the complications of surgery.
Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and
... Show MoreLet R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes