Preferred Language
Articles
/
jpgiafs-1104
The initiative of the Central Bank of Iraq and its impact on some banking activities provided by private Islamic banks
...Show More Authors

Islamic banks are distinguished by providing banking activities that are unique in providing them from the rest of the other types of banks, and these activities are a group of banking services provided by the bank to its customers, whether these banking activities are tangible or intangible. At the same time, it is a source of bank profits, as Islamic banks impose a percentage of Islamic Murabaha on those banking activities , However, these banks have developed new services that they provide with the funds of the Central Bank initiative launched at the beginning of (2016) due to the economic conditions that befell the country due to the (financial security) crisis that the country faced in 2014. To put forward initiatives, and among these initiatives is the initiative of the (1 trillion) Iraqi dinars, which was put forward by private commercial and Islamic banks .

The importance of research is highlighted in knowing the positive or negative impact that the Central Bank of Iraq’s initiative has on the activities offered by Islamic banks (the private sector) and on the activities of these banks. Islamic self-banking , As the research started from a basic assumption based on the success of the Central Bank of Iraq in its initiatives to support small projects, which amounted to (2 trillion) dinars, by positively affecting the operations and activities of private Islamic banks, The research relied on the inductive, deductive and analytical approach in analyzing the annual data of the initiatives submitted by Islamic banks according to the participation of Islamic banks in the research sample, and the research has several achievements, most notably (non-traditional monetary policies are one of the most important tools that central banks resort to at the time of crises , As happened during the Great Depression of 1929-1932 or the global financial crisis of 2008) and to a set of recommendations, the most important of which is (the use of unconventional monetary policy came to confront some financial crises, and since the seed of these crises has sprouted in the environment of the banking system, so it has become It is necessary to study the ways to improve the status of the banking system and develop transparency and safety procedures, as well as setting the necessary controls to prevent practices that are harmful to banking activity.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Human recognition by utilizing voice recognition and visual recognition
...Show More Authors

Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Ni2O3 nanomaterial: Synthesis and characterization by simple chemical process
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Determine the best model to predict the consumption of electric energy in the southern region
...Show More Authors

Abstract:          

                Interest in the topic of prediction has increased in recent years and appeared modern methods such as Artificial Neural Networks models, if these methods are able to learn and adapt self with any model, and does not require assumptions on the nature of the time series. On the other hand, the methods currently used to predict the classic method such as Box-Jenkins may be difficult to diagnose chain and modeling because they assume strict conditions.

  

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
The Role of Website Users in the Consumption of Notifications: A Field Study of Websites
...Show More Authors

This research seeks to explore the impact of notifications on enhancing user engagement with websites, primarily through user subscriptions and their interaction with notifications on these websites. The significance of this study lies in its implications for crafting compelling headlines that capture users' attention, streamline their access to journalistic content, and align with the objectives and editorial policies of news websites. It sheds light on the factors influencing users' preferences for specific notifications and their engagement with content based on their individual interests, motivations, and the satisfaction derived from such interactions.
The researcher has reached several key findings, inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 03 2021
Journal Name
Baghdad Journal Of Biochemistry And Applied Biological Sciences
A clinical-statistical study on COVID-19 infection and death status at the Alshifaa Healthcare Center/ Baghdad
...Show More Authors

Background: COVID-19 is an ongoing disease that caused, and still causes, many challenges for humanity. In fact, COVID-19 death cases reached more than 4.5 million by the end of August 2021, although an improvement in the medical treatments and pharmaceutical protocols was obtained, and many vaccines were released. Objective: To, statistically, analyze the data of COVID-19 patients at Alshifaa Healthcare Center (Baghdad, Iraq). Methods: In this work, a statistical analysis was conducted on data included the total number, positive cases, and negative cases of people tested for COVID-19 at the Alshifaa Healthcare Center/Baghdad for the period 1 September – 31 December 2020. The number of people who got the test was 1080, where 424 w

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Exposure and etching time effects on the fission track density in CR-39 detectors using teeth samples
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
The extent to which the content of social and national studies courses is included With interactive thinking maps for the stages of public education in the Kingdom of Saudi Arabia
...Show More Authors

The present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, inc

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation
BUILDING AND RATIONING SCALE MANAGEMENT CONSTRAINTS OF E-LEARNING FROM THE PERSPECTIVE OF TEACHING THE FACULTY OF PHYSICAL EDUCATION AND SPORTS SCIENCE UNIVERSITY OF BAGHDAD
...Show More Authors