Preferred Language
Articles
/
jeasiq-1629
Measuring and analysis of the impact of public budget deficit on external debt in lraq with in the framework of joint integration of the period (1990 – 2016 )
...Show More Authors

The concept of deficit in public budget becomes a chronic economic phenomenon in most of the world, whether the advanced countries or developing countries. Despite  the difference in the visions of the economic schools to accept or reject the deficit in public budget but the opinion that prevailed is the necessity of the state to reduce the public spending which led to a continuous deficits in the public budget which consequently increased the government borrowing ,increase income taxes and wealth, consequently this weakened the in motivation in private investment which contributed to the increase of in factionary stagnation , so that governments have to cover the lack of local funding sources which become difficult to be equal to increase and continue in public spending ,hauling problem funding from the main problems faced by state developing especially lraq ,what forced to the direction to the loans external which are often conditioned conditions by political and economic complicated ,hence it has focused find the estimation and analysis of relationship between the deficit in budget public and external debt by duration (1990-2016) as a result of the difficult circumstances experienced by lraq during the period  ,the balance was the balance has been exhausted highest level of the study of disability as a result of the continuous increase in public spending ,which resulted in an increase in external debt as a source of funding this deficit ,and in the framework of rating this relationship has reached researcher to the presence of relationship equilibrium long –term between the deficit in budget public and external debt.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Violence and sexual harassment against minors, causes, prevention strategies
...Show More Authors

The aim of this study to investigate the sexual harassment, prevention strategies, and the appropriate ways that tackle this phenomena. The current research consisted of four chapter; the first chapter gave a general introduction about the targeted topic followed by the problem of statement, the significance of study, study’s aims, and end with the limitations of study. The second section of chapter one referred to the common concepts of study. Third section addressed the previous studies that related to the current one. Chapter two concerned with the sexual violence against minors. It has four section; first section addressed number of concepts which related to sexual violence. The second section focused on the implications of sexual

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Bond Stresses between Reinforcing Bar and Reactive Powder Concrete
...Show More Authors

A good performance of reinforced concrete structures is ensured by the bond between steel and concrete, which makes the materials work together, forming a part of solidarity. The behavior of the bond between the reinforcing bar and the surrounding concrete is significant to evaluate the cracking control in serviceability limit state and load capacity in the ultimate limit state. In this investigation, the bond stresses between reinforcing bar and reactive powder concrete (RPC) was considered to compare it with that of normal strength concrete (NSC). The push-out test with short embedment length is considered in this study to evaluate the bond strength, bond stress-slip relationship, and bond stress-crack width relationsh

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
AGENT BASED MONITORING FOR INVESTIGATION PROCESS AND MAINTENANCE IMPROVEMENT
...Show More Authors

Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 10 2014
Journal Name
Monthly Notices Of The Royal Astronomical Society
Warm dark haloes accretion histories and their gravitational signatures
...Show More Authors

We study clusters in warm dark matter (WDM) models of a thermally produced dark matter particle 0.5 keV in mass. We show that, despite clusters in WDM cosmologies having similar density profiles as their cold dark matter (CDM) counterparts, the internal properties, such as the amount of substructure, show marked differences. This result is surprising as clusters are at mass scales that are a thousand times greater than that at which structure formation is suppressed. WDM clusters gain significantly more mass via smooth accretion and contain fewer substructures than their CDM brethren. The higher smooth mass accretion results in subhaloes which are physically more extended and less dense. These fine-scale differences can be probed by strong

... Show More
View Publication
Scopus (17)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Separation Benzene and Toluene from BTX using Zeolite 13X
...Show More Authors

This work deals with the separation of benzene and toluene from a BTX fraction. The separation was carried out using adsorption by molecular sieve zeolite 13X in a fixed bed. The concentration of benzene and toluene in the influent streams was measured using gas chromatography. The effect of flow rate in the range 0.77 – 2.0 cm3/min on the benzene and toluene extraction from BTX fraction was studied. The flow rate increasing decreases the breakthrough and saturation times. The effect of bed height in the range 31.6 – 63.3 cm on benzene and toluene adsorption from BTX fraction was studied. The increase of bed height increasing increases the break point values. The effect of the concentration of benzene in the range 0.0559 – 0.2625g/

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 25 2022
Journal Name
Knowledge And Information Systems
Unsupervised model for aspect categorization and implicit aspect extraction
...Show More Authors

People’s ability to quickly convey their thoughts, or opinions, on various services or items has improved as Web 2.0 has evolved. This is to look at the public perceptions expressed in the reviews. Aspect-based sentiment analysis (ABSA) deemed to receive a set of texts (e.g., product reviews or online reviews) and identify the opinion-target (aspect) within each review. Contemporary aspect-based sentiment analysis systems, like the aspect categorization, rely predominantly on lexicon-based, or manually labelled seeds that is being incorporated into the topic models. And using either handcrafted rules or pre-labelled clues for performing implicit aspect detection. These constraints are restricted to a particular domain or language which is

... Show More
View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Audio compression using transforms and high order entropy encoding
...Show More Authors

<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low &amp; multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Elastic electron scattering from 17Ne and 27P exotic nuclei
...Show More Authors

The ground state proton, neutron and matter densities andcorresponding root mean square radii of unstable proton-rich 17Neand 27P exotic nuclei are studied via the framework of the twofrequencyshell model. The single particle harmonic oscillator wavefunctions are used in this model with two different oscillator sizeparameters core b and halo , b the former for the core (inner) orbitswhereas the latter for the halo (outer) orbits. Shell model calculationsfor core nucleons and for outer (halo) nucleons in exotic nuclei areperformed individually via the computer code OXBASH. Halostructure of 17Ne and 27P nuclei is confirmed. It is found that thestructure of 17Ne and 27P nuclei have 25 / 2 (1d ) and 1/ 2 2s -dominantconfigurations, resp

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Assessing Landsat Processing Levels and Support Vector Machine Classification
...Show More Authors

The availability of different processing levels for satellite images makes it important to measure their suitability for classification tasks. This study investigates the impact of the Landsat data processing level on the accuracy of land cover classification using a support vector machine (SVM) classifier. The classification accuracy values of Landsat 8 (LS8) and Landsat 9 (LS9) data at different processing levels vary notably. For LS9, Collection 2 Level 2 (C2L2) achieved the highest accuracy of (86.55%) with the polynomial kernel of the SVM classifier, surpassing the Fast Line-of-Sight Atmospheric Analysis of Spectral Hypercubes (FLAASH) at (85.31%) and Collection 2 Level 1 (C2L1) at (84.93%). The LS8 data exhibits similar behavior. Conv

... Show More
View Publication