Preferred Language
Articles
/
jpgiafs-511
Supervisory oversight role for the central bank to raise awareness of the banking supervisory: Applied Research in the Central Bank of Iraq and a sample of the Iraqi private banks
...Show More Authors

Representing banking supervision An important function performed by the Iraqi Central Bank, in order to achieve stability in the financial and banking system, and safeguard the rights of depositors, investors and other targets, and to realize the Iraqi Central Bank banking supervision actors on banks, there must be an awareness of regulatory bank's existing control and subject them, as well as the role of banking oversight interested in spreading this awareness.
So sought search to find out the role played by the Iraqi Central Bank in raising awareness of the regulatory banking between the parties to the regulatory process, through the presentation and analysis of the legal framework for banking supervision and awareness supervisory banking, as well as analysis of the views of a sample of the various communities, which represent the parties the regulatory process, and by measuring banking supervisory awareness of these parties.
Search it built on the basic premise (that the banking supervisory awareness by the Central Bank of Iraq's existing oversight and subject them and interested in them) leads to: -
1- improve performance for those in charge of banking supervision and subject to them.

2- To maintain public money and private equity.

3- Quality audit work for those in charge of banking supervision.

This has been proven this hypothesis and to reach a set of conclusions, including: the importance of the role played by the Central Bank of Iraq in the banking supervisory awareness among the parties to the regulatory process, As well as the lack of a modern guide regulating the actions of banking supervision of the staff of the Central Bank of Iraq.

As output Find a set of recommendations including: focus by the Iraqi Central Bank on the rehabilitation and development of the skills of banking supervision of his employees, and attention to the human element in order to keep pace with the global development through training courses in the field of banking supervision, so as to increase awareness of the regulatory banking have, and that reflected on the exercise of effective banking supervision on banks

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Review on Heat Transfer Process Inside Open and Closed Porous Cavity
...Show More Authors

Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Triple Γ-Homomorphisms and Bi - Γ -Derivations on Jordan Γ-algebra
...Show More Authors

In this paper, we introduce the concept of Jordan  –algebra, special Jordan  –algebra and triple  –homomorphisms. We also introduce Bi -  –derivations and Annihilator of Jordan algebra. Finally, we study the triple  –homomorphisms and Bi -  –derivations on Jordan algebra.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (17)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Periodontal status and salivary flow rate among diagnostic radiology department workers
...Show More Authors

Background: diagnostic radiology field workers are at elevated risk level for systemic and oral diseases like periodontal diseases. This study was aimed to estimate the periodontal condition and salivary flow rate among diagnostic radiology workers. Material and method: The sample for this study consisted of a study group radiographers (forty subjects) working for 5 years at least and control group consisted of nurses and laboratory workers away from radiation (forty subjects) in Baghdad hospitals. All the 80 subjects aged 30-40 year-old and looking healthy without systemic diseases. Plaque, gingival, periodontal pocket depth and clinical attachment loss indices were used for recording the periodontal conditions. Under standardized condi

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Purification and Characterization β - lactamase produce from local isolate Klebsiella pneumonia
...Show More Authors

Beta-lactamase was purified from local isolate Klebsiella pneumonia by several steps included precipitation with ammonium sulphate at 20-40% saturation, DEAE- ion exchange chromatography and gel filtration on Sephacryl S-200 column. The obtained purification fold and recovery were 32.66; 47.04% respectively. The characterization of the purified beta-lactamase showed that the molecular weight was about 4000 daltons as determined by gel filtration.Purified enzyme had an optimal pH of 7 for activity and an optimal stability between pH 6.5-7.5, results shows that the optimal temperature appear to be 35 ? C .During storage the enzyme retained 72% at -20 ? C and retained 25% of the activity at the same period at 4 ? C.

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
T-ABSO T-Abso and T-Abso Quasi Primary Fuzzy Submodules
...Show More Authors

     Let Ḿ be a unitary R-module and R is a commutative ring with identity. Our aim in this paper  to study the concepts T-ABSO fuzzy ideals, T-ABSO fuzzy submodules and T-ABSO quasi primary fuzzy submodules, also we discuss these concepts in the class of multiplication fuzzy modules and relationships between these concepts. Many new basic properties and characterizations on these concepts are given.

 

View Publication Preview PDF
Crossref (1)
Crossref