Preferred Language
Articles
/
jeasiq-2237
Internal Debt Options during the Two Double Shocks and Its Impact on Foreign Reserve in Iraq
...Show More Authors

The research aims at a statement Internal Debt options during shocks and the impact of this borrowing in the volume of the foreign reserve, using induction and deduction with available data analysis. During the period (2004-2013) did not require the use of borrowing across (financial institutions, discounted transfers, bonds); it was only sufficient by transfer with commercial banks that can finance of temporary budget deficits: rose and decline of volume of foreign reserve according to the changes of oil prices and the volume of purchases and sales of the Central Bank of Iraq. Central Bank of Iraq (CBI) has significantly contributed to Internal Debt through bond and discounted transfers in the secondary market; thus, funding the public budget and sustaining the momentum of battles during the first double shock (2014-2017), which reflected how it is negatively affected the volume of foreign reserve, in other words, reduction the proportion of foreign assets to local assets. The second double crisis (2020) reduced the exchange rate of the Iraqi dinar against the US dollar, which was reflected at high prices; inflation reached (5.6) at the end of the first half of 2020, which means adopting a new choice to finance the budget deficit. This means that there is an inverse relationship between the volume of foreign reserve and internal debt, where decrease volume of foreign reserve during two double shocks

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Haematological and Genotoxic effects of cadmium chloride on Mesopotamichthys sharpeyi
...Show More Authors

The present study investigated Haematological changes in Mesopotamichthys sharpeyi, as well as determination genotoxic effects of cadmium chloride on bunni fish by using 120 fingerlings, fish were distributed randomly into four treatments in addition to control group. Fish in first group treated (T1) with cadmium 0.093mg/L with changing water and added cadmium continuously, fish in the second group treated (T2) with cadmium 0.093mg/L with changing water without adding cadmium, third treatment (T3) with cadmium 0.046mg/L with changing water and adding cadmium continuously, and fourth treatment (T4) with cadmium 0.046mg/L with changing water without adding cadmium. Results of blood picture in T1 and T3 showed a significant reduction in red bl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
A Survey on Linguistic Interpretation of Facial Expressions and Technologies
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sat Mar 15 2025
Journal Name
Alustath Journal For Human And Social Sciences
Representational and Interactional Meanings of UNHCR Reports on Displaced Iraqis
...Show More Authors

The use of appropriate and accurate language is of utmost importance when describing people on the move and their dilemma, particularly refugees and displaced persons who have unique legal protection. So, there are a lot of scholars who have investigated the United Nations High Commissioner for Refugees’ (UNHCR) reports, but no one has examined representational and interactional meanings of UNHCR reports. Accordingly, this research aims to explore the role of UNHCR reports in enhancing the value of the humanitarian, which is attributed to the uniqueness of its use of language. The current study investigates the manner in which the textual content interacts with the images that are associated with the category of the UNHCR reports. Four re

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Doping And Annealing Effect On Evaporation Of ZnO Thin Films
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue May 07 2019
Journal Name
Acm Journal On Emerging Technologies In Computing Systems
Neuromemrisitive Architecture of HTM with On-Device Learning and Neurogenesis
...Show More Authors

Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil

... Show More
View Publication
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Mar 20 2016
Journal Name
Al-mustansiriyah Journal Of Scienc
Histological and cytogenetic effects of Acetamiprid on male albino mice
...Show More Authors

View Publication
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref