Preferred Language
Articles
/
jeasiq-1630
The effectiveness of the Iraqi banking system in dealing with the effects of fiscal austerity policy
...Show More Authors

Abstract:

    Under the state scenario, fiscal policy will not be able to use the oil surpluses optimally and economically and society, as long as these surpluses are not directed by public expenditure towards new productive investments and by following the path of fiscal policy after one year 2003 and until 2013 we note that it is based on the method of spending (excessive) consumption, and did not take any action towards the budget deficit planned at the beginning of the fiscal year, and the actual surplus at the end of the fiscal year, which represents the highest expenditure in the budget, Salaries and wages of workers in various government agencies with the expansion of spending on the security side. 

     However, during the period (2014-2016) the general budget suffered a severe deficit due to the decline in the prices of petroleum products, which led to a decline in oil revenues, which constitute the largest proportion of total public revenues, which led to the depletion of resources, which in turn led to a decline in public revenues, The unintended deficit in the general budget, which in turn imposed on the economic policies to look at different mechanisms to finance that deficit, and fiscal policy is one of the economic policies through which to find mechanisms to finance the fiscal deficit in Iraq.

      As for the monetary policy measures, after the Central Bank obtained its independence, the central government's foreign currency resources separated from the foreign reserves of the Central Bank of Iraq. Accordingly, the Central Bank is no longer the source of the new monetary issue through which the central government funds the budget deficit as in the previous era, The central bank's relationship with the government has defined articles (24 and 25) as a framework for consultation, coordination, exchange of information and attendance at government meetings related to its activities, hence the role of monetary policy in financing the budget deficit through different mechanisms.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Digitization is a contemporary reality and its importance in the Saudi plastic arts: ابتسام سعود الرشيد
...Show More Authors

After completion of the artistic production, the artist plays the echo of this production upon the recipient. Whether this recipient is from the public, art connoisseurs, or private artists, critics and academics. In the past, the boundaries of Time and place had a great effect in limiting this echo or its quality, as the views of the recipients were largely influenced by the prevailing thought or the artistic trends that dominate the artistic scene in the surrounding environment in which the artist created. In order for the artist to show works for the widest segment of the recipient, he bears the burden of the costs of transporting the work, a keeper of damage on the move, and the material amounts that may hinder the publication of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 16 2022
Journal Name
Journal Of The College Of Languages (jcl)
MCD (LOS MARCADORES DISCURSIVOS) The pragmatic analysis of discourse markers (The argumentative texts of the ABC newspaper as a model): El análisis pragmático de los marcadores discursivos (Los textos argumentativos del periódico ABC como modelo)
...Show More Authors

When writing a text, such as a newspaper article, various types of discourse markers are frequently used to group sentences into paragraphs and parts in order to establish a discourse with certain functions, such as coordination, orientation, emphasizing the concepts presented, etc. It should also be noted that this type of mark exists in both written and spoken language. Therefore, it is convenient to dedicate a chapter to these linguistic elements to clarify their use and their classification, which is mainly based on Jose Portolés (2001), as well as the main features, specifically their features (prosodic, morphological, semantic and pragmatic).

Resumen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 02 2010
Journal Name
Journal Of Kerbala University
N3O3 Hexanuclear Complexes type are Synthesized and Characterised from the reaction of Diphenylmonoxime with (Mn(II) ,Co(II) ,Ni(II) ,Cu(II) ,Zn(II) , and Hg(II) ) ions.
...Show More Authors

The new Hexadentate complexes type [M(H3L3)]K were prepared from the condensation reaction of Diphenylmonoxime and KOH with (Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II)) in methanol with 3:1 ligand : metal ratio to give a series of new complexes of the general formula [M(H3L3)]K (where: M(II) = Mn ,Co ,N ,Cu ,Zn and Hg).All compounds have been Characterized by spectroscopic methods [I.R, U.v-Vis, atomic absorption and microanalysis (C.H.N) along with conductivity measurements. The stability constant K and Gibbs free energy ∆G were calculated for [Co (H3L3)] K, [Ni (H3L3)] K and [Cu (H3L3)] K and complexes using spectrophotometer method. The obtained values indicate that these complexes stable in their solution. From the above data

... Show More
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Dynamical Analysis Within-Host and Between-Host for HIV\AIDS with the Application of Optimal Control Strategy: Dynamical analysis within-host and between-host for an HIV\AIDS
...Show More Authors

The aims of this paper is investigating the spread of AIDS both within-host, through the contact between healthy cells with free virus inside the body, and between-host, through sexual contact among individuals and external sources of infectious. The outbreak of AIDS is described by a mathematical model consisting of two stages. The first stage describes the within-host spread of AIDS and is represented by the first three equations. While the second stage describes the between-host spread of AIDS and represented by the last four equations. The existence, uniqueness and boundedness of the solution of the model are discussed and all possible equilibrium points are determined. The local asymptotic stability (LAS) of the model is studied, wh

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Augmentation of Nanofluids Heat transfer in a Circular Tube with Baffled Winged Twisted Swirl Generator
...Show More Authors

This article introduces a numerical study on heat exchange and corrosion coefficients of Zinc–water nanofluid stream in a circular tube fitted with swirl generator utilizing CFD emulation. Different  forms of swirl generator which have the following properties of plain twisted tape (PTT) and baffle wings twisted tape (BTT) embeds with various ratio of twisting (y = 2.93, 3.91 and 4.89), baffle inclination angles (β = 0°, - 30° and 30) joined with 1%, 1.5% and 2% volume fraction of ZnO nanofluid were utilized for simulation. The results demonstrated that the heat and friction coefficients conducted by these two forms of vortex generator raised with Reynolds number, twist ratio and baffle inclination angles decreases. Likewise, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 05 2017
Journal Name
Oriental Journal Of Chemistry
Adsorption of 4-Chlorophenol from Aqueous Solution onto Iraqi Bauxite and Surfactant–modified Iraqi Bauxite: Equilibrium, Kinetic, and Thermodynamic Studies
...Show More Authors

Natural Bauxite (BXT) mineral clay was modified with a cationic surfactant (hexadecy ltrimethy lammonium bromide (BXT-HDTMA)) and characterized with different techniques: FTIR spectroscopy, X-ray powder diffraction (XRD) and scanning electron microscopy (SEM). The modified and natural bauxite (BXT) were used as adsorbents for the adsorption of 4- Chlorophenol (4-CP) from aqueous solutions. The adsorption study was carried out at different conditions and parameters: contact time, pH value, adsorbent dosage and ionic strength. The adsorption kinetic (described by a pseudo-first order and a pseudo-second order), equilibrium experimental data (analyzed by Langmuir, Freundlich and Temkin isotherm models) and thermodynamic parameters (change in s

... Show More
Publication Date
Mon Dec 25 2017
Journal Name
Oriental Journal Of Chemistry
Adsorption of 4-Chlorophenol from Aqueous Solution Onto Iraqi Bauxite and Surfactant–Modified Iraqi Bauxite: Equilibrium, Kinetic, and Thermodynamic Studies
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Investigation for the Main Active Constituents in Arctium lappa L. Cultivated in Iraq
...Show More Authors

Burdock ( Arctium lappa), is among the most popular plants in traditional medicine and it is associated with several biological effects. Literature survey revealed the presence of phenylpropanoid compounds .The most widespread are hydroxycinnamic acids ( mainly caffeic acid and chlorogenic acid) and lignans (mainly arctiin and arctigenin). This work will confirm the presence of these compounds in Arctium lappa, cultivated in Iraq, in both root and leaf samples.  The dried plant samples were extracted by soxhlet with 80% methanol then separated the main constituents by thin layer chromatography (TLC) and high performance liquid  chromatography (HPLC). Identification of the isolated compounds wa

... Show More
View Publication Preview PDF
Crossref (2)
Crossref