The research aims to measure and analyze the reality of liquidity in the Rasheed Bank and determine their impact on risk and return in order to identify the extent of the efficiency of the management of liquidity by the Bank and how to employ them in a profitable investment areas, and analysis of the compatibility of the liquidity gap and gap the balance sheet (sensitive interest rate) and affected net interest Change prices, and through the adoption of style ladder recommended Meritassets and liabilities by the Central Bank of Iraq, as it is an important and vital aspects in commercial banks' management, when there is a commonly used optimizing the resources of the bank available, it means that there is a banking efficient management is working to stabilize its financial position, So research was focused on the problem of the balance between return and risk in liquidity management, which is a constant challenge and daily problem faced by departments of commercial banks, "including GeneralManagement Rasheed Bank / Management (sample) for the period from 31/1/2013–31/12/2013. Using Some of the financial ratios in Applied Analysis (liquidity ratios, return and liquidity risk), enhanced neo-statistical (SPSS analysis) to prove the strength of the relationship and impact between research, the research found a number of the most important conclusions that there is surplus cash in the bank, and a yield and risk Mtosttin and positive budget gap. The researcher recommends reducing the size of the cash assets, and benefit from the increased deposits and invested in r fled profitable investment.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreA laboratory experiment was carried out according to a completely randomized design with four repetitions on the seeds resulting from a field experiment applied for the two seasons, 2020 and 2021, to find out the effect of the cultivars (Ambar 33, Yasamin, Dijlah, Ambar Al-Baraka and Furat 1) and the harvest dates (at physiological maturity and after 7 and 14, 21 and 28 days of physiological maturity) on the vigour of rice seeds. The results showed the superiority of the seeds of the cultivar Anbar Al-Baraka at first and final counting, dry weight of the seedling, seedling vigor index and electrical conductivity, and the superiority of the seeds of Dijla cultivar at accelerated aging test and cold test without significant difference with th
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study aims to identify the level of students’ awareness at Imam Muhammad bin Saud University of the requirements of married life in the light of social changes and suggested methods to deepen this awareness (according to the Islamic educational vision) from their own perspective. In this study, the researcher used the descriptive approach with a survey research method, depending on questionnaires to collect data, which he applied to students of College of Sharia in Imam Muhammad bin Saud Islamic University, as well as, students in the fields of Sociology, Social Work, and Psychology in the College of Social Sciences. The findings of the study revealed that students are aware of the requirements of married life concerning mutual ri
... Show MoreEl estudio se clasifica dentro los estudios teóricos sobre literatura que se ocupa del estudio de los métodos de la crítica literaria: El Estructralismo literario francés y el Formalismo ruso del siglo XX que se utilizan en la interpretación literaría. Las dos corrientes literarias estudian la literatura como ciencia que busca aplicar un método científico al estudio de la literatura. Dicho estudio trata de exponer las teorías críticas que surgen en el debate de la interpretación de los textos literarios como el de Susan Sontag, Ricoeur Paul y Mijail Bajitin, etc. Además se incluye algunos ejemplos implican el análisis estructuralista y formalista como Kafka y la tragedia Judía. y Sur Racine.
ABSTRACT:
... Show More