Preferred Language
Articles
/
GRfBgo0BVTCNdQwCLBax
Hybridization Methodology of ARMA-FIGARCH Model to Examine Gasoline Data in Iraq
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Mechanism of Using of Income Tax in Achievable of Economic Targets in Iraq
...Show More Authors

The present study is concerned with the role of income tax in implementing economic goals in Iraq and treating the problems and pitfalls in the Iraq economy.

The study also aims at investigating the role of income tax in attracting promising favorite effects into economy.

The study was performed on data covering the period (2003 - 2012) with respect to the variables of (income tax, oil profits) as independent variables and (private consuming expenditure, private investmental expenditure, and standard figure of prices) as dependent variables. To analyze these data, a number of statistical descriptive and analytical techniques were used such as (percentage, standard variance, mediums, F test, T test and SPSS). It has been c

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Supervisory oversight role for the central bank to raise awareness of the banking supervisory: Applied Research in the Central Bank of Iraq and a sample of the Iraqi private banks
...Show More Authors

Representing banking supervision An important function performed by the Iraqi Central Bank, in order to achieve stability in the financial and banking system, and safeguard the rights of depositors, investors and other targets, and to realize the Iraqi Central Bank banking supervision actors on banks, there must be an awareness of regulatory bank's existing control and subject them, as well as the role of banking oversight interested in spreading this awareness.
So sought search to find out the role played by the Iraqi Central Bank in raising awareness of the regulatory banking between the parties to the regulatory process, through the presentation and analysis of the legal framework for banking supervision and awareness supervisory

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE OF ELECTRONIC MARKETING IN PROMOTING THE PRODUCTS OF THE NATIONAL INDUSTRY IN IRAQ: THE ROLE OF ELECTRONIC MARKETING IN PROMOTING THE PRODUCTS OF THE NATIONAL INDUSTRY IN IRAQ
...Show More Authors

ABSTRACT

The research aims to clarify the role of electronic marketing and what it can achieve in promoting the products of the national industry in Iraq. Marketing channel depends on modern communication and information technology that industrial and metal companies can use in promoting and selling their products along with traditional marketing outlets. To achieve the objectives of the research, a questionnaire was used, which consists of three axes, the first includes the personal data of the sample (gender, age, educational attainment, place of residence, marital status, income level), while the second axis includes various questions about the products of the national industry. Third axis includes que

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
دور تنقيب البيانات Data Mining في زيادة أداء المنظمة (( دراسة تحليلية في المصرف الصناعي ))
...Show More Authors

تمهيد

غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.

ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التط

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Some Estimation methods for the two models SPSEM and SPSAR for spatially dependent data
...Show More Authors

ABSTRUCT

In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error          ( λ ) in the model (SPSEM), estimated  the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref