Abstract
The study aimed to identify the expansion in granting credit to Iraqi banking institutions and its impact on the financial position of Iraqi banks in terms of revenues, profits, expenses and property rights in banks, as the expansion in granting bank credit will correspond to an increase or decrease in some items of the balance sheet and the financial position of banks, so the problem of the current study It will be determined through whether the expansion of granting bank credit will affect the financial position of Iraqi banks or not by studying the selected research community of the 10 Iraqi banks listed in the Iraq Stock Exchange, The research sample included the u
... Show MoreI've led an end to the Palestinian presence in the Jordan to the occurrence of a major fault line in relations between Jordan and the Palestinian on the levels of all , and as a result sought King Hussein and the initiative of the U.S. to heal the rift that solution between Jordanians , Palestinians, and the regulation of relations between the two parties announced in March 1972 for the project and unitary featuring Jordan and Palestine in the Arab kingdom united with the two countries , but that the Palestine Liberation Organization and the Palestinian resistance factions rejected by asserting that it is has the right of self-determination of the Palestinian people and no one else , and rejected by the Arab states and ( Israel ) , and l
... Show MoreAbstract. This work presents a detailed design of a three-jointed tendon-driven robot finger with a cam/pulleys transmission and joint Variable Stiffness Actuator (VSA). The finger motion configuration is obtained by deriving the cam/pulleys transmission profile as a mathematical solution that is then implemented to achieve contact force isotropy on the phalanges. A VSA is proposed, in which three VSAs are designed to act as a muscle in joint space to provide firm grasping. As a mechatronic approach, a suitable type and number of force sensors and actuators are designed to sense the touch, actuate the finger, and tune the VSAs. The torque of the VSAs is controlled utilizing a designed Multi Input Multi Output (MIMO) fuzzy controll
... Show Moren this paper, we formulate three mathematical models using spline functions, such as linear, quadratic and cubic functions to approximate the mathematical model for incoming water to some dams. We will implement this model on dams of both rivers; dams on the Tigris are Mosul and Amara while dams on the Euphrates are Hadetha and Al-Hindya.
The question about the existence of correlation between the parameters A and m of the Paris function is re-examined theoretically for brittle material such as alumina ceramic (Al2O3) with different grain size. Investigation about existence of the exponential function which fit a good approximation to the majority of experimental data of crack velocity versus stress intensity factor diagram. The rate theory of crack growth was applied for data of alumina ceramics samples in region I and making use of the values of the exponential function parameters the crack growth rate theory parameters were estimated.
Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e
... Show More