The general trend in Iraqi banks is focused towards the application of international financial reporting standards, especially the international financial reporting standard IFRS 9 “Financial Instruments”, in addition to the directives issued on the Central Bank of Iraq’s instructions for the year 2018 regarding the development of expected credit losses models, and not to adhere to a specific method for calculating these losses and authorizing the banks’ departments to adopt the method of calculating losses that suits the nature of the bank’s activity and to be consistent in its use from time to time. The research problem revolves around the different methodologies for calculating expected credit losses according to the instructions of the Central Bank of Iraq compared to the requirements for calculating those losses according to IFRS 9, as well as the difference between the banks listed in the Iraq Stock Exchange among themselves. The research aims to present methods of forecasting expected credit losses in a sample of Iraqi banks and compare them with the requirements of IFRS 9 and the instructions of the Central Bank of Iraq in this regard. The research reaches a set of conclusions, the most important of which is that the International Financial Reporting Standard IFRS 9 has not been fully applied in Iraqi banks so far. There is also a difference between banks in the methods of calculating expected credit losses according to the mentioned criterion. And based on the conclusions that come, the research presents a set of recommendations, the most important of which is the necessity of preparing the infrastructure in the Iraqi environment first so that the standard can be applied correctly by subjecting the employees to training courses to familiarize them with the IFRS 9 standard, its application methods and requirements.
تتركز مشكلة البحث في ضعف كثير من المربين معلمين كانوا أو مدرسين في التعامل مع أخطاء المتعلمين في ضوء السنة النبوية مما يؤدي إلى تعلم غير منتظم، ومن أهم أسباب هذه المشكلة قلة الإطلاع على الأساليب العملية التي ينبغي أن يتعامل بها المربي مع أخطاء المتعلمين، ولا سيما الأساليب المستمدة من القرآن الكريم والسنة النبوية، وهذا ما لمسه الباحث واقعاً من خلال ممارسته لعملتي التعليم والتدريس لمدة خمس عشرة سنة، ومن خ
... Show MoreWater scarcity is one of the most important problems facing humanity in various fields such as economics, industry, agriculture, and tourism. This may push people to use low-quality water like industrial-wastewater. The application of some chemical compounds to get rid of heavy metals such as cadmium is an environmentally harmful approach. It is well-known that heavy metals as cadmium may induce harmful problems when present in water and invade to soil, plants and food chain of a human being. In this case, man will be forced to use the low quality water in irrigation. Application of natural materials instead of chemicals to remove cadmium from polluted water is an environmental friendly approach. Attention was drawn in this research wor
... Show Moreت لا نم ظ او ره لا يأ لاح اهلاح رضاحلا رصعلا يف ةريطخ ه ةوشرلا لثم ةيداصتقا ةميرج ديعصلا ىلع ةيبلس بقاوع اهل يتلاو زازتبلااو لاوملأا لسغو ني ىلا ةجاحلا تءاج انه نم ، يداصتقلااو يعامتجلاا تاسسؤم لبق نم اهينبت يغبني يرادلإاو يلاملا داسفلا نم دحت تامدخو بيلاسأو تاينقت ةيلاملا مئارجلا نم دحلل ةلودلا اع ىلع عقت يتلا تاسسؤملا نمو ةيئاصقتسلاا ةبساحملا وا ةيئاضقلا ةبساحملاب تلثمت ةيداصتقلاا تادحولا يف ينبت اهقت ة
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreKHalaf Alhmar and what we get from his poem
استهدف البحث الحالي عزل بعض الجراثيم المرضية المشتركة وشملت Listeria monocytogenes و Salmonella spp. و Brucella abortus من أنسجة أعمار مختلفة من الأغنام العواسية المحلية . أخذت عينات من الكبد والكلى والدم ومن محتويات منتصف أمعاء ثلاث مجاميع عمرية من الأغنام العواسية من مجزرة الشعلة ببغداد شملت أعمار اقل من سنة واحدة وسنة إلى سنتين وأكثر من ثلاث سنوات . بينت النتائج عزل جراثيم Listeria monocytogenes و Salmonella spp. و Brucella abortus من كافة المجاميع
... Show Moreدراسة حاكمية الجامعات وأثرها في القرار الاستراتيجي
شهدت معظم المدن السومرية أزدهاراً أقتصادياً خلال عصر أور الثالثة ،أنعكس ذلك من خلال النصوص المسمارية المكتشفة ذات المضامين الاقتصادية المتنوعة ومنها (وصولات تسلم Bullae) التي تميزت بعصر أور الثالثة بأشكالها المتعددة ومنها: الكروية والمربعة والمستطيلة والمثلثة والمضلعة ومعظمها يحتوي على طبعات أختام فضلاً عن أنها تكون مثقوبة طولياً لغرض التعليق.