Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve (OBEC, 2013:21) as well as the size of the reserves of natural gas (Natural Gas) and deep (3,158) billion gallons, enriched by Iraq of the importance of this resource strategic, but unlike the oil-producing countries, Iraq was based on oil revenues in the dam operating expenses, and neglected the rest of the economic sectors. Which led to be among the consuming nations and not producing. Than heavier the general budget, and to make matters worse, is the international claims of Iraq and committed by Iraq before 2003, any of the former regime, governed by international law, which separated the heavily indebted, have created justifications to lay hands on oil revenues by the coalition Provisional Authority and in accordance with UN Security Council resolutions related thereto, and that on the track was set up the Development Fund for Iraq, adopting a fund for the deposit of all revenues from oil sales in the international market for the purposes of restructuring the Iraqi economy and contribute to the economic and social development and bridging the humanitarian needs for the Iraqi people, and the payment of international claims, which set up because of the wrong policies it is the purpose of showing off the power at the expense of the interests of the country and then was McCann!
In this paper, mixed spinel Co0.4Zn0.6Fe2O4 ferrite was synthesized by microwave-assisted combustion method. Photocatalytic activity of the as-synthesized sample was investigated against methylene blue dye at room temperature at different exposure times (60-360 min.) under visible light. Phase impurity and surface morphology which are investigated with XRD analysis and field emission- scanning electron microscopy, indicate that a cubic spinel unit cell structure with a crystilite size and lattice constant are 22.5048nm and 8.37Å, respectively. The saturation magnetization exhibited directly from the hysteresis loop is (70.20emu/g). Optical properties for the investigated ferrite
... Show MoreThis study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDominated the global arena attempts historic centers of imperialism (the United States, Europe, and Japan) to maintain its control of exclusive on the planet through a combination of economic globalization and liberal policies, which allow for capital transit of nationalism, of the Trinity, that is unique to issue decisions alone in all issues, including the interests of these countries alone . But the global landscape began to change with the entry of the twenty-first century world, although the United States, Europe and Japan remain in the list of major economic powers today, but it can not question the idea that the rising powers (Russia, China and India), has transferred the impact of rise to the level of major powers and the re-arrange
... Show MoreThe syntheses, characterization and experimental solid state X-ray structures of five low-spin paramagnetic 2-pyridyl-(1,2,3)-triazole-copper compounds, [Cu(Ln)2Cl2], are presented in this study, for the following five Ln ligands: L1 = 2-(1-(p-tolyl)-1H-(1,2,3-triazol-4-yl)pyridine), L2 = 2-(1-(4- chlorophenyl)-1H-(1,2,3-triazol-4-yl)pyridine), L3 = 4-(4-(pyridin-2-yl)-1H-(1,2,3-triazol-4-yl)benzonitril), L4 = 2-(1-phenyl-1H-(1,2,3-triazol-4-yl)pyridine) and L5 = 2-(1-(4-(trifluoromethyl)phenyl)-1H-(1,2,3- triazol-4-yl)pyridine). These five [Cu(Ln)2Cl2] complexes each contain two bidentate 2-pyridyl-(1,2,3)- triazole (Ln) and two chloride ions as ligands, with the Cu–N(pyridine) bonds, Cu–N(triazole) and Cu–Cl bonds trans to each othe
... Show MoreSome studies indicated a relationship between increased serum levels of osteoprotegerin with arterial calcification and as a result, it leads to the risk of cardiovascular disease. In our study group we selected patients with osteoporosis, with similar age and body mass index for the assessment of the relationship between cardiovascular disease and osteoprotegerin serum level. We took into account the analysis of correlation and association between the presence of distinct patterns of atherosclerosis and associated diseases like high blood pressure, diabetes mellitus, low HDL cholesterol, increased LDL cholesterol, increased triglycerides and was the case of presence of any type of dyslipidemia,
... Show More
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show More