The research aims to identify the concept of financing structure and what are the determinants that affect it and the goals achieved by financing in commercial banks in addition to the sources upon which the financing structure depends consisting of internal financing sources and external financing sources and their connection to the profits of commercial banks. Baghdad, Khaleeji Commercial Bank) registered in the Iraq Stock Exchange during the period for the years (2011-2020) published in the Iraq Stock Exchange from and the research relied on financial analysis tools to analyze the independent variable the following financing structure (the ratio of equity to total assets, the ratio of deposits to Total liabilities, the ratio of loans to total liabilities (as well as the researcher’s use of financial ratios for profitability indicators (the ratio of the rate of return on assets (ROA), the ratio of the rate of return on equity (ROE), the ratio of the rate of return on investment (ROI)) depending on the financial statements Especially the balance sheets and income statements of those banks, and the researcher reached a set of conclusions and recommendations, the most important of which is that the funding structure depends on the trade-off between return and risk and the extent to which financial management prefers one of them, as the bank’s retention of high short-term financing rates compared to long-term financing leads to a decrease in the bank’s profitability due to the high interest Accordingly, the research achieved a set of recommendations, including the study recommends that banks develop effective diversification strategies for the financing structure between owned financing and borrowed financing in order to achieve a better or optimal mix between them, which makes the financing cost at its minimum and increases the profitability of the bank.
Background:The effects of contraception on Trichomonas vaginalis have important implications for women who suffer from infections associated with disruptions in the vaginal ecology, such as bacterial vaginitis and urinary tract infections.
Objective: To find the association of the common types of contraceptions with the Trichomonasvaginalis infection in women admitted to the Al-BatoolTeaching Hospital for Maternity and Children in Baqubah city.
Type of study: Cross-sectional study
Methods: This study consist of 75 women with contraception use and71 apparently healthy non contraception user women admitted to outpatient in Al
... Show MoreDiarrhea is a real disease in childhood which could cause death. Therefore, this study was conducted to isolate Salmonella from 350 stool samples taken from children under five years in age, suffering from diarrhea during the period from March 2019 to March 2020 in Tikrit city / Iraq. The results showed the possibility to isolate ten isolates of Salmonella enterica subsp. Enterica, an infection rate, represents 2.875% of the total rate of patients who suffer from diarrhea. The virulence genes were investigated for ten isolates of S. enterica subsp. enterica, the result is that all isolates possessed the genes stn, invA, lpfA with an appearance percentage of 100%, whi
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
Objectives: To determine the effectiveness of the instructional program on patients’ knowledge about home safety while receiving anti-cancer treatment at Al- Karama Teaching Hospital in Al-Kut City.
Methodology: A quasi-experimental design is conducted through the application of a pre-test and post-test approach for the study and control groups from February 5th, 2020 to April 25th, 2020. A non–probability (purposive) sample of (50) patients treated at the Blood Disease and Oncology Center is selected and divided into two groups. Each group contains (25) patients as control and study groups. An instrument is constructed that is comprised of two parts; t
... Show MoreDust samples have been collected from three areas in Baghdad during dust storm occurred in 18th of June 2009 to characterize elemental particle size and composition by different techniques. The x-ray diffraction detected six minerals those are calcite, and quartz, present as a major components, dolomite, kaolinite, gypsum and plagioclase present as miner components .EDX detected some normal elements presented in local soil except traces of lead , nickel, and chromium. The particle size analysis by a set of sieves have revealed that the majority particle distribution was between (32 and 45)μm . To isolate the aerosol size, PM10 buoyancy method of powder in water showed a signifying amounts of particulate size .Scheerer’s method was app
... Show MoreIn this research, radon concentrations in some types of healthy drinking water samples available in Iraq's market were measured using a technique called Durridge RAD-7-H2O with closed loop. Then the rate of annual effective dose in human taken this water is determined.
It was found that, radon concentrations in studied samples ranged between 1.2 Bq.m-3 to 142 Bq.m-3. The results of the radon concentrations and the rate of annual effective dose for drinking water samples were significantly lower than the USEPA and WHO recommended limits that equal 500 Bq/m3 and 1 mSv/y resp
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.