The research aims at a statement Internal Debt options during shocks and the impact of this borrowing in the volume of the foreign reserve, using induction and deduction with available data analysis. During the period (2004-2013) did not require the use of borrowing across (financial institutions, discounted transfers, bonds); it was only sufficient by transfer with commercial banks that can finance of temporary budget deficits: rose and decline of volume of foreign reserve according to the changes of oil prices and the volume of purchases and sales of the Central Bank of Iraq. Central Bank of Iraq (CBI) has significantly contributed to Internal Debt through bond and discounted transfers in the secondary market; thus, funding the public budget and sustaining the momentum of battles during the first double shock (2014-2017), which reflected how it is negatively affected the volume of foreign reserve, in other words, reduction the proportion of foreign assets to local assets. The second double crisis (2020) reduced the exchange rate of the Iraqi dinar against the US dollar, which was reflected at high prices; inflation reached (5.6) at the end of the first half of 2020, which means adopting a new choice to finance the budget deficit. This means that there is an inverse relationship between the volume of foreign reserve and internal debt, where decrease volume of foreign reserve during two double shocks
There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).
... Show MoreFuture wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser
... Show MoreThis paper deals with the subjective reflections of consumer values on fashion design. The consumer self is determined by the consumer's idea of himself, according to the intellectual, spiritual and social values, and these values take their intellectual reflection in the form of material values that the consumer finds in fashion design. These values are based on considerations between what is intellectual represented by the values of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The consumer self gets its material image represented in the
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.
The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show More