The conservatorship is a legal action to protect troubled banks from credit risk and bankruptcy risk that banks cannot hedge them .The Central Bank role has to protect the financial system from these risks by controlling and supervising. This research studied these risks and explained the role of The Central Bank. This research presented and analyzed the legal framework for supervision and the imposition of conservatorship bank to address the effects that have been achieved as a result of poor management and weak internal controls. Baraka Bank for Investment and Finance was a research sample to measure the financial ratios for the troubled bank, and analysis the results that led to put the conservatorship. The research depends on the hyp
... Show MorePostcolonial reading for any text aroused a great controversy that deserves to be studied it give more dimensions with the awareness that it can be interpreted in numerous ways. Postcolonialism is a challenging field as it covers variety of political, psychological, cultural, and economical activities often called ‘postcolonial’. The concept of culture worked effectively in shaping and mapping postcolonial struggles, which have so profoundly reshaped our world. Man's sense of cultural displacement is the core of this project. Man's quest for cultural adaptation forms a kind of equilibrium and compromise to the vision of human liberation. It is very important to minimize disadvantages and to internalize the logic of Western colonization.
... Show MoreThe aim of this research is to apply Throughput Accounting in improving the cost leadership strategy for the woven fabric department (polyester blended - polyester 150/1) in the Waist Textile and Knitting Factory. The problem of the research is that the research sample laboratory does not apply modern cost management methods represented in Throughput Accounting, as the Iraqi economic units suffer from their inability to compete in the labor market in light of the competitive environment. The Ministry of Interior improved the cost leadership strategy for the product of blended polyester and polyester fabrics 1/150. Through the research, a set of conclusions was reached, the most important of which are: Improving the cost lea
... Show MoreCoronavirus disease 2019 (COVID-19) is a flu-like infection caused by a novel virus known as Severe Acute Respiratory Syndrome coronavirus 2 (SARS-CoV-2). After the widespread around the world, it was announced by the World Health Organization (WHO) as a global pandemic. The symptoms of COVID-19 may arise within 2 weeks and the severity ranged from mild with signs of respiratory infection to severe cases of organ failure and even death. Management of COVID-19 patients includes supportive treatment and pharmacological medications expected to be effective with no definitive cure of the disease. The aims of this study are highlighting the management protocol and supportive therapy especially vitamin D and manifesting the clinical symptoms b
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreAutorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.