The research specified with study the relation between the market share for the sample research banks and the amount of the achieved revenues from the investment, where the dominated belief that there potentiality enhancing the revenue on investment with the increase of the banks shares in their markets after their success in achieving rates of successive growth in their sales of sales and to a suitable achieve market coverage for their products and they have dissemination and suitable promotion activity, the market share represented the competition for the banks, and the markets pay attention to the market share as a strategic objective and to maintain them also increasing them at a certain marketing conditions, where the market share effects positively in the revenue rate on investment, and at the final station, the research has reached several conclusions and recommendations , and the most important of them are:- the research results has proved, in their final form, the significance effect of market share in the profits of the banks of the sample research after the results have proved that there is positive relation between the market share and the investment revenue and any increase in the market share for the sample research sample resulted in increase in the profit levels with the significance of revenue on the investment in the stocks reverse to that, it supports the research hypothesis. The researcher recommends to investigate methods of increasing the banks shares from their sales and positioned advanced locations guarantee achieving a substantiated competitive
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreDust samples have been collected from three areas in Baghdad during dust storm occurred in 18th of June 2009 to characterize elemental particle size and composition by different techniques. The x-ray diffraction detected six minerals those are calcite, and quartz, present as a major components, dolomite, kaolinite, gypsum and plagioclase present as miner components .EDX detected some normal elements presented in local soil except traces of lead , nickel, and chromium. The particle size analysis by a set of sieves have revealed that the majority particle distribution was between (32 and 45)μm . To isolate the aerosol size, PM10 buoyancy method of powder in water showed a signifying amounts of particulate size .Scheerer’s method was app
... Show MoreThe study of sex Structure and age characteristics of an important element of the
follow-up changes between different population groups, which are connected to a large degree
the demographic, social and economic characteristics, particularly since each population
group varying characteristics in terms of age, sex entail social, demographic, cultural and
economic implications, and from that the researcher has taken from Structure of sex and age
for population in the district of Tuz Khurmatu for (1997-2012 ) the subject of consideration
and maintain compared to see the contrast between them. Qualitative Research for installation
and the age of the urban and rural areas has touched the judiciary, as well as its respects
Some major pollutants of polycyclic aromatic hydrocarbons (PAH) those discharged as water produced (WP) from the AlAhdab oil field (AOF) in the ponds close to it may leak to the water resources around and eventually reaches the marshes which will affect its ecosystem. Thus, this work aims to track the availability of PAH in the water resources and the Main Outfall Drain (MOD) nearby. The determination of PAH was evaluated using “High-Performance Liquid Chromatography (HPLC)”. The mean concentration of sixteen PAH in the produced water within the field was relatively high (0.01 to 10.89 g/ml) with standard deviations of (0.10.9). While, PAH outside the field were gradually diminishes down to (0.01-0.039) x10-2 g/ml which exceeds th
... Show MoreObjectives of this project were to study the effect of 60% crude alcoholic extract of the seeds of cyperus esculentuson induced endometritis in the mice . The plant of cyperus esculentuswas extracted by preparing Alcoholic extract 60% . One hundred microliters of saline containing Escherichia coli (104cfu) was used to induce endometritis, by a single intracervicallyinjection, and endometritis developed after 2 days from injection. The mice were divided into five groups, The first group were treated with alcoholic extract of cyperus esculentusextract 150mg/kg body weight, the second group was treated with a daily 3mg per kg body weight of gentamicin given intra peritoneal,The third group was treated by 75mg/kg of cyperus esculentusextract an
... Show More