DBNRHM Sami, International Journal of Research in Social Sciences and Humanities, 2020
The article aims to study the liquidity that is required to be provided optimally and the profitability that is required to be achieved by the bank, and the impact of both of them on the value of the bank, and their effect of both liquidity and profitability on the value of the bank. Hence, the research problem emerged, which indicates the extent of the effect of liquidity and profitability on the value of the bank. The importance of the research stems from the main role that commercial banks play in the economy of a country. This requires the need to identify liquidity in a broad way and its most important components, and how to
... Show MoreTheoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].
Key words:Jasminumsambac, Volatile oil, Antioxidant.
This study aimed to provide a theoretical framework for the impact of the Turkish intervention in northern Syria and the extent of its impact on the relations between the two countries.
It also sought to answer the study's main question: What is the impact of the Turkish intervention in northern Syria on Turkish-Syrian relations during the period 2011-2019 ?.
In this study, the historical method, the descriptive method, and the systems analysis method were used, with the aim of arriving at an accurate and realistic understanding of the Turkish-Syrian relations.
The study reached a set of results, the most important of which was that the Syrian-Turkish relations are based on interests, and that all alliances and
... Show MoreAfter the fall of the Soviet Union, a number of Eastern Bloc countries and Soviet republics have witnessed political transition. However, Turkmenistan, as one of the former Soviet republics, succeeded to preserve the authoritarian nature of the former Soviet regime. This study seeks to answer a number of research questions, the most prominent of which are: How were the political elite in Turkmenistan able to preserve the legacy of the Soviet policy based on centralization of power and individual rule?. The study reaches a set of conclusions, the most important of which are:
1-The roots of the tyranny in Turkmenistan are du to internal and external structural factors. The most important of which are: the former Soviet policies of m
... Show MoreThe Rafidian artist discussed the headdresses of his idols with a varied scholarly momentum, so each idol had its own cover as this door of diversity contributed to the enrichment of Rafidian thought and full knowledge of their ideas and beliefs consistent with their multiple symbolic connections such as architecture, for example. The previous one, if not its entirety.
A research such as this (the discursive connections to the head-covers of the deities of the Mesopotamian civilization) aims to clarify the confusion that occurs through four chapters: The first chapter included: the research problem, the importance of research and the need for it, the objectives of the research, the temporal, spatial and objective limits of research, a
This research tries to reveal how to manage and control the competitive edge for business by building managerial skills in various organizational levels. Our research aims at finding out the nature of various technical, human and in tellectual skills of a new president whose superiority is his competitive ness in the application field at general company for construe tioual industriesand testing the surveyed minor and major changes through a questionnaire to collect information from officials. The sample was composed of (45) director. The data was analyzed using some methods and statistical programs. The most prominent of these is (SPSS) that was used to extract the arithmetic mean, standard deviation, correlation coefficient
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More