Preferred Language
Articles
/
jeasiq-673
The compatibility of the Development Fund for Iraq to the requirements of sovereign wealth funds An analytical study of the legal framework and institutional structure in accordance with the standards of the Santiago
...Show More Authors

Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve (OBEC, 2013:21) as well as the size of the reserves of natural gas (Natural Gas) and deep (3,158) billion gallons, enriched by Iraq of the importance of this resource strategic, but unlike the oil-producing countries, Iraq was based on oil revenues in the dam operating expenses, and neglected the rest of the economic sectors. Which led to be among the consuming nations and not producing. Than heavier the general budget, and to make matters worse, is the international claims of Iraq and committed by Iraq before 2003, any of the former regime, governed by international law, which separated the heavily indebted, have created justifications to lay hands on oil revenues by the coalition Provisional Authority and in accordance with UN Security Council resolutions related thereto, and that on the track was set up the Development Fund for Iraq, adopting a fund for the deposit of all revenues from oil sales in the international market for the purposes of restructuring the Iraqi economy and contribute to the economic and social development and bridging the humanitarian needs for the Iraqi people, and the payment of international claims, which set up because of the wrong policies it is the purpose of showing off the power at the expense of the interests of the country and then was McCann!          

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Open Dentistry Journal
Depression, Anxiety and Stress Among Dentists During COVID-19 Lockdown
...Show More Authors
Introduction:

The objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.

Methods:

A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.

Results and Discussion:

Being unsatisfied with the job was as

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Al-Hafizh Abdan al-Ahwazi, 306 And his modern efforts
...Show More Authors

Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search

View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators
...Show More Authors

 الأثر V بالنسبة إلى   sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي

... Show More
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 26 2021
Journal Name
Oral Diseases
Association between maternal periodontitis, acute‐phase reactants and preterm birth
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Carbonized Copolymers Nonwoven Nanofibers Composite: Surface Morphology and Fibers Orientation
...Show More Authors

Carbonized nonwoven nanofibers composite were fabricated using the electrospinning method of a polymeric solution composite followed by heat treatment including stabilization and calcination steps. The spun polymeric solution was a binary polymer mixture/organic solvent. In this study, two types of polymers (Polymethylmethacrylate (PMMA) and Polyethylene glycol (PEG)) were used separately as a copolymer with the base polymer (Polyacrylonitrile (PAN)) to prepare a binary polymer mixture in a mixing ratio of 50:50. The prepared precursor solutions were used to prepare the precursor nanofibers composite (PAN: PMMA) and (PAN: PEG).  The fabricated precursors nonwoven fibers composite were stabilized and carbonized to produce carbon nonw

... Show More
View Publication Preview PDF
Crossref (1)
Crossref