Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve (OBEC, 2013:21) as well as the size of the reserves of natural gas (Natural Gas) and deep (3,158) billion gallons, enriched by Iraq of the importance of this resource strategic, but unlike the oil-producing countries, Iraq was based on oil revenues in the dam operating expenses, and neglected the rest of the economic sectors. Which led to be among the consuming nations and not producing. Than heavier the general budget, and to make matters worse, is the international claims of Iraq and committed by Iraq before 2003, any of the former regime, governed by international law, which separated the heavily indebted, have created justifications to lay hands on oil revenues by the coalition Provisional Authority and in accordance with UN Security Council resolutions related thereto, and that on the track was set up the Development Fund for Iraq, adopting a fund for the deposit of all revenues from oil sales in the international market for the purposes of restructuring the Iraqi economy and contribute to the economic and social development and bridging the humanitarian needs for the Iraqi people, and the payment of international claims, which set up because of the wrong policies it is the purpose of showing off the power at the expense of the interests of the country and then was McCann!
In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show MoreThis paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application
... Show MoreThe current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show MoreAndalusian literature is a literature in itself that is influenced and influenced, and it did not come out of thin air. Muslim Arabs came from the East to this country for jihad and a desire to live, and they carried with them their beliefs, customs and traditions. They must blend in the new element and its environment, so interference, fusion, diversity and influence actually took place.
It seems to us that the Arabs in the era of the governors in Andalusia (92-138 AH) strived hard to preserve everything that is Eastern. Literature is an oriental model in the content of prose and poetry, but in the era of the Umayyad emirate, we will notice that the environment, the development of ages, and the mixing of civilizations have an effect
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More