The research aims to analysis of the current financial crisis in Iraq through knowing its causes and then propose some solutions that help in remedy the crisis and that on the level of expenditures and revenues, and has been relying on the Federal general budget law of the Republic of Iraq for the fiscal year 2016 to obtain the necessary data in respect of the current expenditures and revenues which necessary to achieve the objective of the research , and through the research results has been reached to a set of conclusions which the most important of them that causes of the current financial crisis in Iraq , mainly belonging to increased expenditures and especially the current ones and the lack of revenues , especially non-oil ones , as well as dependence of Iraq on the oil as main source of revenue make it more target to aggravation the financial crisis because of declining oil prices will affects minusly on public budget revenues and lead to increase the total deficit. Based on the conclusions that have been reached it has been proposed numerous recommendations which from the most important of them necessity of reducing the current expenditures , especially high salaries through modification it , andadjusting the current pension law by reducing the legal age of retirement and years of service for the country employees to provide large sums of money and to remedy the career surplus existing in most of the country offices , and necessity of diversification the other non-oil revenue sources through the activation of agriculture, industry and the expansion of tourism and increase local production and try to increase the exports of non-oil to increase the money entering the country
In this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
Communication and media technologies have seen several changes in the last two decades. These changes put the basis for the emergence of communicative and media practices on several levels including political, economic, technological and artistic. And these, in turn, led to the emergence of new media trends and phenomena in various areas of media worthily to be studied and researched for example online advertisings. Online advert
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIt has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE
... Show MoreAn experimental investigation of the variation of argon discharge current with a glow and afterglow time intervals of a square discharge voltage was carried out at low pressure (6-11 mbar). The discharge was created between two circular metal electrodes of diameter (7.5 cm), separated horizontally by a distance (10 cm) at the two ends of a Pyrex cylindrical tube. A composite of two Gaussian functions has been suggested to fit and explain the variation graphs clearly. It is shown that the necessary times of glow and afterglow needed to attain a maximum discharge current are (70 us) and (60 us), respectively. The discharge current is observed to drop to the lowest value when the two times are serially longer than (85 us) and (72 u
... Show More
He research specifies subjects which may contribute in improve productivity of the General Company for vegetable oil product/ Al-Farab factory and aims to release the relationship between system Quick Response Manufacturing (QRM) and scheduling operations.
The Implementation was in the general company for vegetable oil product (Al-Farab factory), Universe Factory It suffers from a failure to follow Scheduling in its operations And not taking into account the lead times And delays in product delivery dates, Here are drawing the attention of the administration in the factory to use Quick Response Manufacturing (QRM) to control the energy and inventory, machin
... Show MoreIn light of the increasing importance of interim financial statements they provided these lists of information that enables users of accounting information to make wise investment decisions and predict the company's activities in light of changes the updated rather than wait until the end of the year and accessing information provided by the annual financial statements. In light of this research has come to the most important set of conclusions the adoption of interim financial information has been audited by the external auditor to the availability of basic qualitative characteristics in the accounting information contained in the (appropriate and timely manner, reliability and comparability) and this in turn leads to the impact on reli
... Show MoreAbstract
The current research aims to identify the effect of the idea filtering strategy on the achievement of second-intermediate school female students in science. The two researchers adopted the experimental method and the experimental design with partial control in the two groups (experimental group and control group). The two researchers applied the research experience to a sample of students of the second intermediate grade in the school Martyrs of (Jiser Al Aimma for Girls) affiliated with the Baghdad Education Directorate / Rusafa /1 for the academic year (2021/2022), which was chosen intentionally. The number of female students in the research sample was (70) students, with (35) students for the ex
... Show More