As the banking sector is a strong influence on the country's economic growth,The solid financial well-being of anybank does not mean only a guarantee for its investors, It is also important for both owners and workers and for theeconomy in all its joints.The elements of capital adequacy and quality of assets are important to the functioning of thebanking business.In this study, the research sample included four private banks. Quarterly data were used for the period(2011 - 2018).Moreover, data is also collected from articles, papers, the World Wide Web (the Internet) and specializedinternational journals.In this research, an effort was made to try to find out the effect of (the ratio of the capital owned todeposits on the value of the bank),
... Show MoreThis present study is aimed at deciding the impact of exercises adapted to the ranges of movements of the arm on the performance of javelin throwing. As long as javelin throwing is quite a complex athletic event that presupposes a considerable amount of strength, speed, and biomechanical accuracy, it is crucial to learn whether the exercises designed to target the peculiarities of arm movements can have a positive effect on the performance of javelin throwers. To the study, experimental research with a single group of six youth javelin throwers was carried out. Before and after the eight-week training program, the pre-tests and post-tests were conducted to find the results of training with a specific focus on resistance exercises. Significa
... Show MoreIn this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliab
... Show MoreField experiments were carried out for the autumn season 2022- 2021 in the field of College of Agricultural Engineering Sciences - University of Baghdad - Jadiriyah Complex –Station A- to study a combination of organic fertilizer (Vermicompost) and cow manure as well as a control treatment (soil only) intertwined with Spraying with silicon, calcium and distilled water (control) in the growth and production of three cultivars of beet (Cylindra, Dark Red, Red) within the design of Completely Randomized Block Design at three replications, The number of treatments was 9 for each replicate. The means were compared according to the least significant difference (L.S.D) at a probability lev
The aim of this research is to study the influence of additives on the properties of soap greases, such as lithium, calcium, sodium, lithium-calcium grease, by adding varies additives, such as graphite, molybdenum disulfide, carbon black, corrosion inhibitor, and extreme pressure.
These additives have been added to grease to obtain the best percentages that improve the properties of grease such as load carrying, wear resistance, corrosion resistance, drop point, and penetration.
The results showed the best weight percentages to all types of grease which give good properties are 1.5% extreme pressure additive, 3% graphite, 1% molybdenum disulfide, 2.5% carbon black.
The other hand, the best weight percentage for corrosion inhibit
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called