The banking sector has a significant impact on the economic growth of the country, and the importance of this sector must assess its financial performance from time to time, to measure the situation related to money for each bank and how to put the supervision of the efficiency of the full. The research aims at evaluating the financial performance according to the elements of the CAMELS model, which including capital adequacy, asset quality, management efficiency, profitability, liquidity, and market risk sensitivity. The research included the study of Al-Mansour Investment Bank during the period from 2014 to 2018. The base capital ratio was used to total assets to measure capital adequacy The proportion of investments to total assets to measure the quality of assets, the ratio of expenses to profits to measure management efficiency, the ratio of net profit to income to measure profitability and the ratio of cash to deposits to measure liquidity and the proportion of interest income to its expenses to measure the sensitivity of market risks. The most important results of the research were that the bank obtained the third classification for its overall financial performance according to the results of the composite classification of the CAMELS model during the years of research, in addition to the weak management of the bank's assets.
Abstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreWe presented here a 65years old lady with an unusual presentation of a large epigastric hernia of twenty years duration .The swelling was occupying all the right hypochondrial region .The diagnosis was made on r^E^a-operative identification of the defect in the linea alba which wassutured after removal of the hernial sac and its contents .The postoperative course was uneventful and the patient remained with no complications or recurrence for more than two years follow up.
Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreAbstract
The phonetic replacement is the process of putting a sound or a linguistic
syllable instead of another in one word that results in changing its meaning . It is one
way of vocabulary varionsness and discrimination because replacement among the
sounds of one expression and changing its image lead to change its meaning , and
accordingly , each replaced sound has its own linguistic value that distinguishes it . In
other words , the phonetic replacement is based on system of phonemic change
which is a general phenomenon in all languages . The linguistic system doesn’t stand
straight for word unless it is based on different standards that work on variousness ,
assortment and relating the phonetic change wi
Two dwarf snakes were discovered, Eirenis thospitis Schmidtler & Lanza from Sereen mountain, north east of Arbil and E. rothii Jan from Saffin mountain North of Arbil city North of Iraqi Kurdistan. Supported by description and important notes on variation. In addition summarized list for 9 species of the genus Eirenis Jan in Iraq is also presented.
This piece of research work aims to study one of the most difficult reaction and determination due to continuous and rapid variation of reaction products and the reactants. As molybdenum (VI) aid in the decomposition of hydrogen peroxide in alkaline medium of ammomia, thus means a continuous liberation of oxygen which cuases and in a continuous manner a distraction in the measurement process. On this basis pyrogallol was used to absorbe all liberated oxygen and the result is an a clean undisturbed signals. Molybdenum (VI) was determined in the range of 4-100 ?g.ml-1 with percentage linearity of 99.8% or (4-300 ?g.ml-1 with 94.4%) while L.O.D. was 3.5 ?g.ml-1. Interferring ions (cations and anions) were studied and their main effect was red
... Show MoreThis research includes the principles of the democracy، and to which extent it can contribute in establishing these principles. Democracy is not only to hold parliamentary or presidential elections but also the result of these elections wills it lead to the emergence of an integrated regime that can actually expresses the citizen's rights and to which extent those citizens can contribute in that regime and control it. Since 2005، when the first elections took place in Iraq after the US occupation of Iraq 2003، Iraqi people are looking to a rule that represented them and achieve their interests after getting rid of the totalitarian regimes and establishing an institutional regime that work by democratic means in order to achieve the so
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show More