Preferred Language
Articles
/
jpgiafs-210
Liquidity Banking and Its Impact on the Return and Risk: Applied Research in the Rasheed Bank
...Show More Authors

The research aims to measure and analyze the reality of liquidity in the Rasheed Bank and determine their impact on risk and return in order to identify the extent of the efficiency of the management of liquidity by the Bank and how to employ them in a profitable investment areas, and analysis of the compatibility of the liquidity gap and gap the balance sheet (sensitive interest rate) and affected net interest Change prices, and through the adoption of style ladder recommended Meritassets and liabilities by the Central Bank of Iraq, as it is an important and vital aspects in commercial banks' management, when there is a commonly used optimizing the resources of the bank available, it means that there is a banking efficient management is working to stabilize its financial position, So research was focused on the problem of the balance between return and risk in liquidity management, which is a constant challenge and daily problem faced by departments of commercial banks, "including GeneralManagement Rasheed Bank / Management (sample) for the period from 31/1/2013–31/12/2013. Using Some of the financial ratios in Applied Analysis (liquidity ratios, return and liquidity risk), enhanced neo-statistical (SPSS analysis) to prove the strength of the relationship and impact between research, the research found a number of the most important conclusions that there is surplus cash in the bank, and a yield and risk Mtosttin and positive budget gap. The researcher recommends reducing the size of the cash assets, and benefit from the increased deposits and invested in r fled profitable investment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Central European Agriculture
Biofertilizer (EM-1) effect on growth and yield of three bread wheat cultivars
...Show More Authors

Farmers keep trying to avoid using chemical fertilizer without losing high yield. A field experiment was conducted in the fields of Agriculture College, University of Baghdad during winter seasons of 2015 and 2016 to investigate the response of three bread wheat (Triticum aestivum L.) cultivars (Ibaa99, Abu-Ghraib3 and Buhooth22) to the frequency of spraying with biofertilizer (EM-1) (one time at tillering stage, twice at tillering and stem elongation stages and three times at tillering, stem elongation and booting stages) in addition to the control (without spraying), to the increase of grain yield. Randomized complete block design (RCBD), in split plots arrangement and four replications, was used. Spraying treatments were placed as main p

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Synthesis and characterization study of n-Bi2O3/p-Si heterojunction dependence on thickness
...Show More Authors

View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Fri Aug 22 2025
Journal Name
Al–bahith Al–a'alami
INDICATEURS OF THE EXCELLENT PUBLIC RELATION PRACTICE
...Show More Authors

« This paper presents the indicators of the development of excellent public relations in the institutions of higher education that are possible for three contextual variables: institutional, professional, professional, and effective communication. Therefore, the study used six indicators to measure the excellent public relations in institutions of higher education and scientific research. These indicators are based on the theory of excellence in public relations . Research Objectives: The aim of the research paper is to uncover the institutional, professional, and professional indicators of effective communication of excellent public relations in higher education institutions. Resea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Carol Ann Duffy’s Poetry: Reframing the World
...Show More Authors

In her poetry, Carol Ann Duffy looks into the concerns of the disregarded and humiliated people. Approaching facts fearlessly and disclosing realities in a way highly characteristic of her, she establishes the world newly and reframes it honestly. This research shows how Duffy reframes the world in her own peculiar terms, starting with her own creative use of the language, in particular, when the forms of things of the world are distorted, thus our perception of things will be reframed too.
As regards relations among people, the research elucidates how Duffy’s strained characters abandon real life and reframe an eccentric way of living, while respecting faith, wherein Duffy notices that religious rituals confine the intellect, she r

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Effect of Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar
...Show More Authors

The current paper aims at knowing the effect of  Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar.

The current paper is confined to a sample of  Basic 7th Class Female Students-  Khaniqin –belonged Morning schools for the academic year 2014-2015 . The sample amounted 50 female students  distributed on two sections ( A,B) . Section A represented  experimental group ( 24) female  students  studied according to the exemplar of ( Wettli) and (B) represented control group (26) female students who have studied with traditional method. The researcher has qualified between these two groups  b

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Methods of computer word formation in the modern Russian language: Способы словообразования в сфере компьютерных неологизмов в современном русском языке
...Show More Authors

This paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Fabrication of PVC Enrofloxacin-Selective Electrodes for Estimating Enrofloxacin in Pure Form and as Preparation Formula:
...Show More Authors

This study explored the development and qualities of the response of electrochemical properties of enrofloxacin-selective electrodes using precipitation based on producing phosphotungstic, after utilizing a matrix of polyvinyl chloride (PVC) and dibutyl phthalate or dibutyl phosphate as a plasticizer. The resulting membrane sensors were an enrofloxacin-phosphotungstic electrode (sensors 1) and an ENR-DOP-PTA electrode (sensors 2). Linear responses of (ENR-DBPH-PTA) and (ENR-DOP-PTA) within the concentration ranges of 2.1×10-6-10-1 and 3.0×10-6-10-2 mol. L-1, respectively, for both sensors were observed. Slopes of 51.61±0.24 and 39.40± 0.16 mV/decade and pH ranges equal to 2.5-8.5

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 28 2020
Journal Name
The Iraqi Journal Of Veterinary Medicine
Isolation and Molecular Identification of Nontuberculous Mycobacterium from Different Species of Fish in Karbala Province, Iraq
...Show More Authors

This study was designed for isolation and molecular identification of Nontuberculous Mycobacterium (NTM) from fish during the period between October and December 2017 from Karbla province, Iraq. This study included 200 fresh fish samples from four different species including Spondyliosoma cantharus, Liza abu, Carassius carassius and Cyprinuscarpio. Three samples of each fish were taken including gills, muscles and all internal organs. The samples were processed by decontamination, concentration of 4% sodium hydroxide, and 0.1 ml of sediment was streaking on Löwenstein Johnson (LJ) media; then the bacterial cultures were incubated at 28-30 °C for 3days up to 4 weeks and suspected colonies were stained with acid fast stain to confir

... Show More
View Publication
Scopus (1)
Scopus Crossref