The banking sector of all kinds is the backbone of the economy in all countries, as it is the main financier of most economic projects in order to achieve economic development and achieve stability, which contributes to providing the necessary resources in return for obtaining a profit margin in exchange for giving up his money and bearing credit risks. Among the aforementioned banking sectors are: Islamic banks that invest their capital in several forms in order to obtain profits that enable them to continue and grow, and the most important of these formulas is the Murabaha formula, which is summarized by the bank selling a commodity after owning it and then selling it to the applicant for this commodity based on a prior request and the bank’s promise to buy it in exchange for the bank’s receipt On a specific percentage of the profits, if there is a contract between the Islamic bank (the seller) and the customer (the buyer) documenting the details of the contract, provided that the buyer pays the amount of the sale with the profits in the form of monthly installments or according to what is agreed upon.
The paper uses the Direct Synthesis (DS) method for tuning the Proportional Integral Derivative (PID) controller for controlling the DC servo motor. Two algorithms are presented for enhancing the performance of the suggested PID controller. These algorithms are Back-Propagation Neural Network and Particle Swarm Optimization (PSO). The performance and characteristics of DC servo motor are explained. The simulation results that obtained by using Matlab program show that the steady state error is eliminated with shorter adjusted time when using these algorithms with PID controller. A comparative between the two algorithms are described in this paper to show their effectiveness, which is found that the PSO algorithm gives be
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThe effective application of the method of measuring and evaluating performance according to the Balanced Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.
The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non
... Show MoreThe current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a
... Show MoreThis study seeks to shed light on the aspects of visual pollution and its impact on the aesthetics of the town of Al-Eizariya known to suffer from the phenomenon. In order to identify the real causes of the problem which develops in various forms and patterns, threatening not only the aesthetic appearance of the towns, but also causes the emergence of new problems and phenomena that will have negative repercussions on the population. The researcher uses the analytical descriptive method to analyze the phenomenon of visual pollution in terms of reality, development, manifestations and spread and uses photos which document the visual pollution and its impact on the aesthetics of the known. The study concluded the existence of a strong rela
... Show MoreMost systems are intelligent and the industrial world is moving now towards
technology. Most industrial systems are now computerized and offer a high speed.
However, Face recognition is a biometric system that can identify people from their
faces. For few number of people to be identified, it can be considered as a fast
system. When the number of people grew to be bigger, the system cannot be adopted
in a real-time application because its speed will degrade along with its accuracy.
However, the accuracy can be enhanced using pre-processing techniques but the
time delay is still a challenge. A series of experiments had been done on AT&TORL
database images using Enhanced Face Recognition System (EFRS) that is
The aim of this research is to identify the availability of visual thinking skills in the chemistry textbook scheduled for the third intermediate grade for the academic year (2020-2021) in the Republic of Iraq. The study sample consisted of all (85) images contained in the chemistry course for the third intermediate grade, which are (85) form using the curriculum. Analytical descriptive A list of visual thinking skills was prepared, and the unit of form was adopted as a unit of analysis and repetition as a unit of counting, and frequencies and percentages were used for statistical treatment, and validity and reliability were calculated. And using the Holste equation. The following results were reached: The skill
... Show MoreIn this work 27 events have been chosen for the period from (17 Feb 2000 to 10 Sep 2014) to analyze their intensity profile and find out what is the most effective reason behind the bulk of the accelerated SEPs as seen in the interval from the onset to the maximum intensity. It was found that the parameters of the associated eruptions (CME and solar flare) could play a major role in this acceleration. We considered some of these parameters such as: flare class related to soft X-ray flux, CME's speed and acceleration, site of the eruption (western, eastern) and particle transport in the IP medium. The shape of the profile showed a clear changing in ΔT1 (time from onset to maximum), as an inverse relation with the acceleration of coronal
... Show Morehe planning process is generally aimed at developing the city and making it meet the needs of different citizens. The green areas constitute one of the basic needs of the city and with the rapid and unusual growth in the size of cities, especially in the third world countries, which is often embodied in capitals. Which was achieved as a result of many reasons, including political, economic and social and even enshrined through some of the decisions that were issued and the city of Baghdad, but a clear example of these cities. The city and the environment are inseparable terms. The city is where people spend their lives and their daily experiences, and the environment is the center in w
... Show More