This paper addresses the factors responsible for changes in crude oil prices, in real market and financial sector. In order to prepare the analytical background for further investigation, it highlights the patterns of correlations of the real oil price and the most related prices of assets, exchange rate and government bond yield. The paper reviews the statistical behavior of oil price, quantities and the global macroeconomic environment. Topics discussed include the theory of differential rent and scarcity effect ,the role of future market and speculation, strategies of energy of the major economies to investigate the prospects of oil market and the potential demand for OPEC's oil. The paper explores the interrelationship between spot and future prices using daily data , explanatory power of real effective exchange rate in addition to conventional demand and supply functions. Although, The paper finds regularities consistent with the predictions of economic theory, it concludes that the changes in real price of oil have historically tended to be difficult to predict. Further research works are recommended particularly in the areas of storage arbitrage and financial future contracts.
The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThat the guarantee of respect for human rights and fundamental freedoms requires that all individuals within society be treated equally, and that the State, as the primary guarantor of the rights and freedoms of individuals, must provide adequate protection and combat any cause that would create discrimination or instigate a sense of hatred among the inhabitants of our beloved country, What we know is that the greatest factor that has lost lives is the hate factor throughout history, and the extremist groups have found no more effective reason than the creation of the hate factor. Hatred was the weapon for which many people were killed. The record of preparations for the
... Show More
Abstract
Indeed, being busy with the understanding of religion is the best sort of worship that the almighty God has given each period of time a number of scholars and wise men. They receive what has been passed down to them from their great ancestors, and those who are willing to learn will learn, their students preserve their knowledge through teaching and writing. Thus, the scholars were pioneers in this field due to the value and importance of their knowledge. They have strived in learning, explaining, and writing new subjects.
One of those scholars is sheikh (Abdulrahman Al-Penjweni) who passed away 1319 AH in one of the villages of the city of Sulaimani in Iraq. He was one of the wisest scholars, a br
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe increase in economic institutions, commercial companies and international trade operations among them across countries and in most countries of the world and the inadequacy of their national laws and national judiciary to settle the disputes arising from them between the parties led to the tendency of legal thought to search for specialized, appropriate and quick tools to decide on them, so international commercial arbitration came In the first place for the settlement of those disputes, especially those that arose within the framework of international trade relations.
As a result, the demand for arbitration, especially international commercial, has increased, while other problems have emerged with it, namely, deceit of oppon
... Show MoreInternational responsibility rises against the United Nations Organization for the actions of the Security Council according to the theory of risks, in the event that ships, submarines and aircraft carriers that operate with nuclear energy are launched against countries that violate the provisions of Chapter VII the Charter of the United Nations, considering that the Council's actions here are considered as internationally legitimate acts of exceptional risks that the Council may resort to it in order to ensure the speed and effectiveness referred to in Article (11 / Paragraph 2) of the charter and to keep pace with developments in modern technology.