Preferred Language
Articles
/
PBez9pIBVTCNdQwC1sSC
دور مؤشر السيولة المصرفية في الرقابة الإشرافية للبنك المركزي العراقي على المصارف المتخصصة
...Show More Authors

عد الرقابة الإشرافية احد اهم الأدوات التي تستخدمها البنوك المركزية في تقييم التزام المصارف بالمتطلبات التنظيمية والقوانين الصادرة منها وتستخدم البنوك المركزية عدة مؤشرات مالية منها مؤشر السيولة المصرفية لتقييم أداء المصارف تجاه حماية أموال المودعين وحماية المصارف من خطر نقص السيولة ومن ثم التعرض للإفلاس، لذا اقتضت الضرورة إلى دراسة مؤشر السيولة المصرفية الذي يستخدم كأحد أدوات الرقابة الإشرافية من قبل البنك المركزي العراقي عند تقييم أداء المصارف المتخصصة، خلصت مشكلة البحث في إن استخدام مؤشر السيولة المصرفية في تقييم أداء المصارف المتخصصة يؤثر بشكل عكسي في إمكانية تحقيقها لأهدافها التنموية لأنه يؤدي إلى تعطيل جزء من الموارد الذاتية التي تعتمد عليها في تقديم الائتمان التنموي، والتي تختلف عن مصادر أموال المصارف التجارية التي تعتمد بشكل أساس على أموال الودائع، الأمر الذي يؤدي إلى توفير معلومات غير صحيحة عن تقييم أداء هذه المصارف، ولإثبات هذه المشكلة استند البحث إلى الفرضية التي أشارت إلى إن الالتزام بمؤشر السيولة المصرفية يؤثر بشكل سلبي في تحقيق المصارف المتخصصة لأهدافها التنموية، يهدف البحث إلى التعرف على مؤشر السيولة المصرفية وكذلك الأساليب المتبعة في الرقابة الإشرافية من قبل البنك المركزي العراقي،، ولإثبات فرضية البحث قام الباحث بتقييم أداء المصارف المتخصصة بمؤشر السيولة المصرفية باعتماد المنهج التحليلي والكمي في الجانب التطبيقي، ومن ثم تحليل تلك النتائج ومعرفة أثرها في إمكانية تحقيق الأهداف التنموية للمصارف المتخصصة، وتوصل البحث إلى جملة من الاستنتاجات أهمها إن مؤشر السيولة المصرفية لا يتلاءم مع طبيعة وأهداف المصارف المتخصصة ويعيق بشكل بالغ إمكانية تحقيقها لأهدافها التنموية التي تسعى لها وهي تنمية القطاعات الثلاث (القطاع الزراعي والصناعي والعقاري)، ومن ثم أوصى البحث بمجموعة من التوصيات التي يقتضي الأمر إن تأخذ بها الجهات المعنية بإجراء تقييم الأداء عند تقييم الأداء للمصارف المتخصصة.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
AN EXPERIMENTAL STUDY OF THE EFFECT OF VORTEX GENERATOR ON THE FLAT-PLATE BOUNDARY LAYER: AN EXPERIMENTAL STUDY OF THE EFFECT OF VORTEX GENERATOR ON THE FLAT-PLATE BOUNDARY LAYER
...Show More Authors

This paper is dealing with an experimental study to show the influence of the geometric characteristics of the vortex generators VG son the thickness of the boundary layer (∂) and drag coefficients (CD) of the flat plate. Vortex generators work effectively on medium and high angles of attack, since they are "hidden" under the boundary layer and practically ineffective at low angles.

            The height of VGs relative to the thickness of the boundary layer enables us to study the efficacy of VGs in delaying boundary layer separation. The distance between two VGs also has an effect on the boundary layer if we take into

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Fast Processing RNA-Seq on Multicore Processor
...Show More Authors

RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Body parts idioms; across-cultural significance
...Show More Authors

0

View Publication Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
New Adaptive Data Transmission Scheme Over HF Radio
...Show More Authors

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
عرض كتاب على خط النار مذكرات الرئيس الباكستاني
...Show More Authors

عرض كتاب على خط النار مذكرات الرئيس الباكستاني

View Publication Preview PDF
Crossref