Preferred Language
Articles
/
jeasiq-1630
The effectiveness of the Iraqi banking system in dealing with the effects of fiscal austerity policy
...Show More Authors

Abstract:

    Under the state scenario, fiscal policy will not be able to use the oil surpluses optimally and economically and society, as long as these surpluses are not directed by public expenditure towards new productive investments and by following the path of fiscal policy after one year 2003 and until 2013 we note that it is based on the method of spending (excessive) consumption, and did not take any action towards the budget deficit planned at the beginning of the fiscal year, and the actual surplus at the end of the fiscal year, which represents the highest expenditure in the budget, Salaries and wages of workers in various government agencies with the expansion of spending on the security side. 

     However, during the period (2014-2016) the general budget suffered a severe deficit due to the decline in the prices of petroleum products, which led to a decline in oil revenues, which constitute the largest proportion of total public revenues, which led to the depletion of resources, which in turn led to a decline in public revenues, The unintended deficit in the general budget, which in turn imposed on the economic policies to look at different mechanisms to finance that deficit, and fiscal policy is one of the economic policies through which to find mechanisms to finance the fiscal deficit in Iraq.

      As for the monetary policy measures, after the Central Bank obtained its independence, the central government's foreign currency resources separated from the foreign reserves of the Central Bank of Iraq. Accordingly, the Central Bank is no longer the source of the new monetary issue through which the central government funds the budget deficit as in the previous era, The central bank's relationship with the government has defined articles (24 and 25) as a framework for consultation, coordination, exchange of information and attendance at government meetings related to its activities, hence the role of monetary policy in financing the budget deficit through different mechanisms.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 29 2018
Journal Name
Iproceedings
Effect of Reminding Parents on Vaccination Dates Using Mobile Short Messages on the Routine Vaccination Coverage of Infants in Al Resafa-Baghdad, 2015-2016
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 26 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of the oral findings, salivary oxidative status and IgA level among group of workers exposed to petroleum pollutants in Al-Daura oil refinery
...Show More Authors

Background: Oil refinery workers are continuously exposed to numerous hazardous materials. Petroleum contains the heavy metals as a natural constituent or as additives. These metals induce the production of ROS which associated with an oxidative damage to DNA, proteins, and lipids. This study was conducted to assess the salivary levels of heavy metals, salivary oxidative status, oral immunological activity (salivary sIgA) and assessment of the oral findings among the workers of Al-Daura oil refinery in Baghdad city. Subjects, Materials and Methods: This study was done in Al-Daura oil refinery; samples consist of 60 workers involved in refinery processes (study group) and 20 non-workers (control group). Oral examination and saliva collection

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Study The Predation Efficiency of Chrysoperla carnea (Stephens)(Neuroptera :Chrysopidae) Larvae in Controlling Nymphs and Adults of Cabbage Aphid Brevicoryne brassicae (L.) (Homoptera :Aphididae).
...Show More Authors

Results showed high efficiency of the predator Chrysoperla carnea (Stephens) to attack and consume nymphal instars and adults of cabbage aphid, Brevicoryne brassicae (L.).The total average of the nymphal instars consumed by the larval stage of predator were 308.67, 285.9, 198.77, 154.7 for 1st ,2nd ,3rd ,4th nymphal instars respectively .While it was 110,107.9 for apterae and alatae respectively . Also, predation efficiency increases with the progress of the larval instars up to the third (last) which was the most voracious .The 1st instar nymph consumed by the larvae of the predator were 47,80,181.67 nymphs ,with predation rate of 14.71% , 23.75% and 50.13% for 1st ,2nd and 3rd larval instars

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Conflict management and its relation to functional performance as perceived by secondary school managers toward the directors of directorates of education in wassat province
...Show More Authors

The research aims to; identify the management of conflict as perceived by secondary school managers toward the directors of directorates of education in wassat province, identify functional performance as perceived by secondary school managers toward the directors of directorates of education in wassat province. Besides, explore the relationship between Conflict management and functional performance among the directors of directorates of education in wassat province. A descriptive approach deemed more appropriate with study design. As a tool to collect the data of current research, the author used a questionnaire. Spss tools were used for data analysis

View Publication Preview PDF
Publication Date
Mon Sep 08 2025
Journal Name
Proceedings Of The Indian National Science Academy
Investigation of electric quadrupole moments in Ne, Mg, Si, S, and Ar even–odd nuclei and the structural stability of neighboring even-even nuclei
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 26 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical expression of MMP9, as a marker of local invasion in Hodgkin’s and Non-Hodgkin’s lymphoma of the head and neck region
...Show More Authors

Background: Malignant lymphoma is the generic term given to tumors of the lymphoid system and specifically of lymphocytes and their precursor cells, While all lymphomas are malignant neoplasms, there is a wide spectrum of clinical behavior, with some following an indolent clinical course and others behaving in an aggressive manner (will causing death in a short time frame if left untreated). The metastatic process involves intravasation and extravasation of tumor cells, followed by reimplantation of tumor cells, formation of a new tumor stoma, Degradation of the extracellular matrix and components of the basement membrane by proteases facilitates the detachment of tumor cells, their crossing of tissue boundaries, and invasion into adjacent

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Studying the x- ray atomic Scattering form Factor and Nuclear Magnetic Shielding Constant for Be atom in its Excited state (1s2 2s 3s) and the Be - like ions
...Show More Authors

The division partitioning technique has been used to analyze the four electron systems into six-pairs electronic wave functions for ( for the Beryllium atom in its excited state (1s2 2s 3s ) and like ions ( B+1 ,C+2 ) using Hartree-Fock wave functions . The aim of this work is to study atomic scattering form factor f(s) for and nuclear magnetic shielding constant. The results are obtained numerically by using the computer software (Mathcad).

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Sep 14 2021
Journal Name
Egyptian Journal Of Chemistry
Real wastewater Treatment by Electrocoagulation- Electro-oxidation Combined System: Optimization using Taguchi Approach
...Show More Authors

In this study, the optimum conditions for COD removal from petroleum refinery wastewater by using a combined electrocoagulation- electro-oxidation system were attained by Taguchi method. An orthogonal array experimental design (L18) which is of four controllable parameters including NaCl concentration, C.D. (current density), PH, and time (time of electrolysis) was employed. Chemical oxygen demand (COD) removal percentage was considered as the quality characteristics to be enhanced. Also, the value of turbidity and TDS (total dissolved solid) were estimated. The optimum levels of the studied parameters were determined precisely by implementing S/N analysis and analysis of variance (ANOVA). The optimum conditions were found to be NaCl = 2.5

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref