Customers' creditworthiness standards are the key means employed by private commercial banks in assigning a suitable credit assessment for each customer. Accordingly, it had an instrumental role in indicating the degree of solvency of the potential customer before granting the required credit. The research problem reveals the nature of the relationship between the criteria of customer’s creditworthiness and banking liquidity. The most critical objectives of the study shed light on the role of using creditworthiness criteria as a tool for credit analysis of customers by banks that help reducing credit risks and thus increase banking liquidity. The questionnaire that was distributed to bank employees, the research sample, which w
... Show MoreThe TV plays an active role in building the general culture of the recipients, which calls for emphasizing its contemporary mission in rebuilding the values that support the development and modernization of diverse societies. Such importance is necessary to explore the challenges facing the cultural invasion, The space opening, which had its cultural returns to the societies, produced a space for alternative values and antagonisms in the cultures and traditions of these societies in the midst of a psychological / social conflict behind a clash with the peculiarities of Muslim societies. Cultural Adtha.
From these points of view, and because the universities are an important stage to announce the demands of the advocates of change and
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
The goal of health awareness is to familiarize people with health information and facts, and make them realize their sense of responsibility towards their health and the health of others. And translate that goal in practice through applying healthy and sound behaviors spontaneously. This, the goal, is pursued by health awareness announcements through employing announcement persuasion of health as one of the methods of influencing the masses to adopt ideas, behaviors, and adherence to health advice and guidelines; The study aims to analyze the content of the Ministry of Health and Environment announcements regarding health awareness and to reveal the most employable persuasions in health awareness announcements
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreBackground: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreAn in-depth experimental study of the matrix effect of antifreeze (ethylene glycol) and water contamination of engine oil through FT-IR spectroscopy. With a comparison of the percent by volume concentration of contaminated fresh 15W-40 engine oil, there appeared to be a noticeable reduction in the O–H stretching signal in the infrared spectrum when ethylene glycol based antifreeze was included as a contaminant. The contaminants of distilled water, a 50/50 mixture of water and commercial ethylene glycol antifreeze, and straight ethylene glycol antifreeze were compared and a signal reduction in the O–H stretch was clearly evident when glycol was present. Doubling the volume of the 50/50 mixture as compared to water alone still res
... Show More