عد الرقابة الإشرافية احد اهم الأدوات التي تستخدمها البنوك المركزية في تقييم التزام المصارف بالمتطلبات التنظيمية والقوانين الصادرة منها وتستخدم البنوك المركزية عدة مؤشرات مالية منها مؤشر السيولة المصرفية لتقييم أداء المصارف تجاه حماية أموال المودعين وحماية المصارف من خطر نقص السيولة ومن ثم التعرض للإفلاس، لذا اقتضت الضرورة إلى دراسة مؤشر السيولة المصرفية الذي يستخدم كأحد أدوات الرقابة الإشرافية من قبل البنك المركزي العراقي عند تقييم أداء المصارف المتخصصة، خلصت مشكلة البحث في إن استخدام مؤشر السيولة المصرفية في تقييم أداء المصارف المتخصصة يؤثر بشكل عكسي في إمكانية تحقيقها لأهدافها التنموية لأنه يؤدي إلى تعطيل جزء من الموارد الذاتية التي تعتمد عليها في تقديم الائتمان التنموي، والتي تختلف عن مصادر أموال المصارف التجارية التي تعتمد بشكل أساس على أموال الودائع، الأمر الذي يؤدي إلى توفير معلومات غير صحيحة عن تقييم أداء هذه المصارف، ولإثبات هذه المشكلة استند البحث إلى الفرضية التي أشارت إلى إن الالتزام بمؤشر السيولة المصرفية يؤثر بشكل سلبي في تحقيق المصارف المتخصصة لأهدافها التنموية، يهدف البحث إلى التعرف على مؤشر السيولة المصرفية وكذلك الأساليب المتبعة في الرقابة الإشرافية من قبل البنك المركزي العراقي،، ولإثبات فرضية البحث قام الباحث بتقييم أداء المصارف المتخصصة بمؤشر السيولة المصرفية باعتماد المنهج التحليلي والكمي في الجانب التطبيقي، ومن ثم تحليل تلك النتائج ومعرفة أثرها في إمكانية تحقيق الأهداف التنموية للمصارف المتخصصة، وتوصل البحث إلى جملة من الاستنتاجات أهمها إن مؤشر السيولة المصرفية لا يتلاءم مع طبيعة وأهداف المصارف المتخصصة ويعيق بشكل بالغ إمكانية تحقيقها لأهدافها التنموية التي تسعى لها وهي تنمية القطاعات الثلاث (القطاع الزراعي والصناعي والعقاري)، ومن ثم أوصى البحث بمجموعة من التوصيات التي يقتضي الأمر إن تأخذ بها الجهات المعنية بإجراء تقييم الأداء عند تقييم الأداء للمصارف المتخصصة.
This paper is dealing with an experimental study to show the influence of the geometric characteristics of the vortex generators VG son the thickness of the boundary layer (∂) and drag coefficients (CD) of the flat plate. Vortex generators work effectively on medium and high angles of attack, since they are "hidden" under the boundary layer and practically ineffective at low angles.
The height of VGs relative to the thickness of the boundary layer enables us to study the efficacy of VGs in delaying boundary layer separation. The distance between two VGs also has an effect on the boundary layer if we take into
... Show MoreRNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show Moreعرض كتاب على خط النار مذكرات الرئيس الباكستاني