Preferred Language
Articles
/
jeasiq-1887
Banking liquidity and the possibility of invested it in enhancing the solvency For a number of commercial banks in Iraq
...Show More Authors

The primary function of commercial banks is the process of converting liquid liabilities such as deposits to illiquid assets, (also known as a loan), liquid assets, (aka cash and cash equivalent) in a balanced manner between liquid and illiquid assets, that guaranteed the preservation of the rights of depositors and the bank and not by converting liquid liabilities into liquid assets in a very large percentage. This comes from its role as depository and intermediary institutions between supply and demand, therefore, we find that the high indicators of bank liquidity and solvency may reflect a misleading picture of the status of commercial banks, to some extent in terms of the strength of their balance sheets and their adherence to the instructions and standards of the Central Bank. Are these indicators result from optimal policies of these banks, are they confused policies, or are they as a result of the situation of the prevailing local economy? Thus, the bank's liquidity is deemed as the backbone of the bank's work, in fact, bank's work depends on it, since it Reflected the status of solvency, sustainability, and continuity, Consequently, this importance led us to choose the subject of the study.

For the purpose of identifying this problem and try to find solutions for it, this study aimed to identify the possibility of investing banking liquidity in order to enhance the solvency of commercial banks. This study was conducted on a sample of Iraqi commercial banks, included three banks, of which two private banks and a government bank, and for the period from 2011 to 2017, in order to identify the nature of investment and credit policies of these banks and analyze their strengths and weaknesses, as well as their roles in enhancing their solvency. The study relies on the combination of inductive and deductive approaches. In addition, the study depends on the descriptive-analytical approach in analyzing the taken data and information of the governmental and private banks from the official bodies, Central Bank of Iraq, and the Iraqi Stock Exchange. At the end of the study, the researcher has reached a number of conclusions, and this includes that the public and privet commercial banks suffer from limited credit and investment activity, which caused high liquidity and liquid assets at the expense of other assets at banks, Naturally, this means the accumulation of non-income liquid funds which significant have an impact on its solvency, and formed "phantom financial solvency", This result reflects the fear of these banks to Employ their liquidity in fields of investment and credit, Involves some type of risk.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Injury Prevention
The effectiveness of injury prevention program on reducing the incidence of lower limb injuries in adolescent male soccer players
...Show More Authors

The highest incidence of injury is seen in adolescent playing pivoting sports such as soccer, basketball, and handball. Objective: To examine the effectiveness of a neuromuscular prevention program in reducing knee and ankle injuries in adolescent male soccer players.

Publication Date
Thu Jun 01 2023
Journal Name
مجلة التربية الرياضية
The Administrative Flexibility of The Iraqi National Olympic Committee from Administrative Bureau Members’ point Of View in Sport Federations
...Show More Authors

Publication Date
Fri Jun 30 2006
Journal Name
Al-kindy College Medical Journal
The Use of Spiral Computerized Tomography in the Diagnosis of Middle –Third Facial Fractures as Compared to Plain Radiography
...Show More Authors

Background: Trauma is one of the most common
clinical problems that confront the maxillofacial
surgeon and radiologist alike. Middle third facial
fractures are diagnosed primarily on the bases of
clinical examination and plain radiographs than can
result in much preoperative speculation.
Objective: To assess the advantages of spiral
computerized tomography over conventional
radiography in the pre-surgical evaluation of middle
third facial fractures.
Methods: Thirty patients with thirty-eight facial
fractures were studied, all patients were examined
clinically, by plain radiography and then by spiral CT.
Results: Of the 38 middle-third fractures, 16
(42.1%) were zygomatic fractures, 8 (21.1%) were

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
The diagnostic value of Paraoxonase (PON 1) enzyme activity in the diagnosis of knee joint osteoarthritis: case control study
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison of the Marginal Fitness of the Ceramic Crowns Fabricated with Different CAD/CAM Systems (An In Vitro Study)
...Show More Authors

Background: The marginal fit is the most characteristic that closely related to the longevity or success of a restoration, which is absolutely affected by the fabrication technique. The objective of present in vitro study was to evaluate the effect of four different CAD/CAM systems on the marginal fit of lithiµm disilicate all ceramic crowns. Materials and Methods: Adentoform tooth of a right mandibular first molar was prepared to receive all ceramic crown restoration with deep chamfer finishing line (1mm) and axial reduction convergence angle of 6 degree, dentoform model duplicated to have Nickel-Chromiµm master die. Thirty two stone dies produce from master die and distributed randomly in to four groups (8 dies for each group) accor

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Further Results on (a, d) -total Edge Irregularity Strength of Graphs
...Show More Authors

Consider a simple graph   on vertices and edges together with a total  labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say  defined by  for all  where  Also, the value  is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by  and is the least  for which G admits   edge irregular h-labeling.  In this article,   for some common graph families are examined. In addition, an open problem is solved affirmatively.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Indian Journal Of Science And Technology
Improvement of the Accuracy of the Perturbed Orbital Elements for LEO Satellite by Improving 4th Order Runge–Kutta’s Method
...Show More Authors

Background/objectives: To study the motion equation under all perturbations effect for Low Earth Orbit (LEO) satellite. Predicting a satellite’s orbit is an important part of mission exploration. Methodology: Using 4th order Runge–Kutta’s method this equation was integrated numerically. In this study, the accurate perturbed value of orbital elements was calculated by using sub-steps number m during one revolution, also different step numbers nnn during 400 revolutions. The predication algorithm was applied and orbital elements changing were analyzed. The satellite in LEO influences by drag more than other perturbations regardless nnn through semi-major axis and eccentricity reducing. Findings and novelty/improvement: The results demo

... Show More
Crossref (1)
Crossref
Publication Date
Fri Sep 20 2024
Journal Name
Linguistic And Philosophical Investigations
Mental Alertness among Students of the Chemistry Department at the College of Education for Pure Sciences - Ibn Al-Haytham
...Show More Authors

The current research aims to identify the level of mental alertness among students of the Department of Chemistry in the Faculty of Education for Pure Sciences – Ibn Al-Haytham during the academic year (2022-2023). To achieve this goal, a descriptive approach was followed. The research community was identified as all chemistry students across the four grades (first, second, third, and fourth). A sample from each grade was selected for the current research. A tool was prepared to measure mental alertness within the research sample. The researcher adopted the scale by Baer, Smith, Kristemoyer, & Tany (2006), which was developed by Al-Buhairi et al. (2014), ensuring its validity, reliability, and psychometric characteristics, making i

... Show More
Preview PDF
Publication Date
Tue Jul 14 2020
Journal Name
Baghdad Science Journal
The Green Synthesize of Zinc Oxide Catalyst Using Pomegranate Peels Extract for the Photocatalytic Degradation of Methylene Blue Dye
...Show More Authors

In this study, the zinc oxide NPs have been synthesized from the fresh pomegranate peels extract using the precipitation method. The ZnO nanoparticles were produced from the reaction of fresh peels extract with zinc acetate salt which was used as zinc source in the presence of 2 M NaOH. The green synthesized nanoparticles were characterized through X-ray diffraction (XRD), UV-Vis diffuse reflection spectroscopy, Fourier transform infrared spectroscopy (FTIR), and Atomic force microscopy (AFM). The XRD patterns confirm the formation of hexagonal wurtzite phase structure for ZnO synthesized using pomegranate peels extract with average crystalline size of 28 nm. FTIR spectra identify the presence of many active functional groups for the pom

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref