Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve (OBEC, 2013:21) as well as the size of the reserves of natural gas (Natural Gas) and deep (3,158) billion gallons, enriched by Iraq of the importance of this resource strategic, but unlike the oil-producing countries, Iraq was based on oil revenues in the dam operating expenses, and neglected the rest of the economic sectors. Which led to be among the consuming nations and not producing. Than heavier the general budget, and to make matters worse, is the international claims of Iraq and committed by Iraq before 2003, any of the former regime, governed by international law, which separated the heavily indebted, have created justifications to lay hands on oil revenues by the coalition Provisional Authority and in accordance with UN Security Council resolutions related thereto, and that on the track was set up the Development Fund for Iraq, adopting a fund for the deposit of all revenues from oil sales in the international market for the purposes of restructuring the Iraqi economy and contribute to the economic and social development and bridging the humanitarian needs for the Iraqi people, and the payment of international claims, which set up because of the wrong policies it is the purpose of showing off the power at the expense of the interests of the country and then was McCann!
has experienced a step-change since the inception of ambient mass spectrometry removed the requirement for samples to be investigated under vacuum conditions. Approaches based on surface– plasma interactions are especially promising, including PADI. Whilst the mechanisms involved in generating PADI spectra still need to be unravelled, PADI shows significant promise to become a valuable and versatile tool in the instrumental arsenal available to the surface analyst
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More