Commercial banks represent the main pivot in financing national economic activity and its development. The capital represents safety margin to depositors and represents a defense line that protects bank work from dangers. Basel committee requirements represent protection and comprehensive supervision to bank activities for depositors, debtors and the bank. It provides trust in bank dealings and tackles activities of high dangers. The most prominent of these requirements are capital adequacy that concerns bank management and supervision and auditing bodies such as the central bank and protecting banks that suffer weakness in its vital important borrowing activity that reflects weakness in implementing borrowing policy .The purpose of political borrowing guarantee security borrowing that the bank give it security supervision continual on the process of borrowing of the whole stages ,in spite of its differences from bank to another but its agree with in general framework that consisting of its contents .The data of this study show that capital adequacy standard in Rafidean Bank cannot be applied currently because of its small current capital (25) milliard dinar which is a small amount to result that capital adequacy =1/2% almost . And the need of the bank to support its credit position with increasing transparency and clarity to improve its classification in Iraq extent (12%) in credit classification agencies. The recommendation includes the evolution policy and procedures instrument of loans that goes to the constancy of the bank and to assume the responsibility towards strategic risks of loans to continuation and supervision among standards level of qualification and efficiency to enormous averages benefit advantages according to the acceptable risks .The bank has to measure capital adequacy throughout the significance to the entire risks and measure it throughout the capital adequacy standards in order to be confirmed that the bank committed to application of this standards.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreWilla Cather (1873-1947) sought to capture the gradation of human emotion through carefully selected descriptive and narrative touches and firmly controlled management of dramatic scenes, situations, dialogue, and point of view. Cather’s novels and stories drew increasingly upon her personal experiences and memories.
The old settlement of Virginia and the new lands of Nebraska formed the bedding ground for Willa Cather’s talents; so did the layers of memory she found across the North American continent, from New Mexico to Canada. She saw the full-blooded European immigrants, Czechs and Swedes, plowing the unbroken land, on the way up from peasants to proprietors.
 
... Show MoreBiodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .
The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreThis research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.
A total 474 argasid ticks removed from 617 hosts including bats, rodents, and birds were found belong to four species of the genus Argos. One of which A. reflexus is reported for the first time for Iraq. Some informations regarding the infestation rate, intensity and some biological data are provided.