The Banking Supervision of the most important functions of the Central Bank of Iraq, which he intended to have a strong banking system and a sound and competitive, and exercised control over the banks by inspection bodies to ensure their compliance with the laws, regulations and orders and instructions and the safety of their financial positions.
The research was aimed to release the concept of banking inspection, compliance and problems and obstacles faced by the inspectors, and monitors compliance and down to make recommendations.
Has been reached on a set of theoretical and practical conclusions, including: -
1-confirmed the statistical analysis of the answers to the research sample the importance of the role o
... Show MoreAdolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives
This study addressed the work stress sources and level of the communicator in public relations in governmental institutions in the United Arab Emirates. The importance of this study is the lack of studies on work stress of the communicator in public relations. The study aimed to investigate the work stress source Physical, individual, groups, organizational and Professional source which effect on the performance of communicator in public relations. The researcher used the descriptive approach and questionnaire as an essential tool for collecting information. Some of the important results of the study are The communicator in public relations facing stress in work by 42% which affect on his performance by average level. The organizational
... Show MoreInformativity, being an essential component of text/discourse, plays a significant role in highlighting the intended meaning and finally contributes to the overall process of rendering a text cross-culturally. It has, however, been overlooked by translators in doing their jobs. In poetic translation, informativity plays a particularly significant role as it sheds light on the ungraspable traits of meaning.
This study tries to explore this aspect in a translation of Emily Dickenson's Slant of Lights to see where the translator fell short in this aspect with attempts to produce an alternative translation taking into consideration the various orders of informativity. For this purpose, a model of informativity is forwarded t
... Show MoreStylistics is the analysis of the language of literary texts integrated within various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are unanticipatedly and carefully connected to issues of gender(Mills,1995:1) &nb
... Show More
Abstract
Due to the momentum of winning in the streets of the city of Baghdad as a result of the large number of checkpoints so felt researcher to conduct a field visit to find out the main reasons that led to this congestion and to find practical solutions to mitigate wastage winning the arrival time citizen to where you want the least possible time.
This research aims to overcome the difficulties experienced by citizens to reach their places of work and reduce waste at the time of service and waiting time as well as reduce the cost of waiting.
Has emerged study a set of conclusions, including the use of model queue (G / G / C) and the mome
... Show MoreImpressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More