Preferred Language
Articles
/
jeasiq-681
International variables and their impact on the flow of foreign direct investment in Gulf Cooperation Council (GCC)
...Show More Authors

Abstract:

The six Arab Gulf states (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, UAE) play a vital role, especially with its geographical location and natural  resources (oil and gas) as well as other cultural and civilizational elements, in achieving  global economic balance and more specifically global energy security, naturally  because of  these countries have a comparative advantage in the field of fossil energy (oil and gas), thus this sector becomes more attractive for local and international investments alike. Being  the energy sector a leader sector in the economic development process, and the basic factor to achieve savings and financial surpluses in these countries for several decades .

  Foreign direct investment has become principal reason to achieve growth and develop the ability for competiveness of many countries, even those possess mineral and natural resources, and achieving financial abundance and surpluses in public finances including the six Gulf Cooperation Countries (GCC), which began  encouraging foreign investment and attempts for serious reforms in the economic, legal and administrative systems to improve the investment environment in the world as a whole, and managed some of these countries to find sectors attract foreign investment as a sector petrochemicals, construction, and the establishment of free zones to attract investment to these areas.

   This research focuses on international variables can play an influential role in increasing investment flows or reduce them, and these variables are different in origin and influence and try to focus in this paper on the effects of these variables and the strength of interdependence with the internal environment in those countries.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Single Face Detection on Skin Color and Edge Detection
...Show More Authors

Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
ON Weak g *sD -Sets And Associative Separation Axioms
...Show More Authors

   In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .
 

View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 18 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM

... Show More
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Foreground Object Detection and Separation Based on Region Contrast
...Show More Authors

Foreground object detection is one of the major important tasks in the field of computer vision which attempt to discover important objects in still image or image sequences or locate related targets from the scene. Foreground objects detection is very important for several approaches like object recognition, surveillance, image annotation, and image retrieval, etc. In this work, a proposed method has been presented for detection and separation foreground object from image or video in both of moving and stable targets. Comparisons with general foreground detectors such as background subtraction techniques our approach are able to detect important target for case the target is moving or not and can separate foreground object with high det

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Image Watermarking Based on IWT and Parity Bit Checking
...Show More Authors

     Various document types play an influential role in a lot of our lives activities today; hence preserving their integrity is an important matter. Such documents have various forms, including texts, videos, sounds, and images.  The latter types' authentication will be our concern here in this paper. Images can be handled spatially by doing the proper modification directly on their pixel values or spectrally through conducting some adjustments to some of the addressed coefficients. Due to spectral (frequency) domain flexibility in handling data, the domain coefficients are utilized for the watermark embedding purpose. The integer wavelet transform (IWT), which is a wavelet transform based on the lifting scheme,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 26 2021
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review on Medical Child Abuse and Child Protection
...Show More Authors

Background

Medical child abuse describes a child receiving unnecessary, harmful, or potentially harmful medical care at the caretaker's instigation.

Objectives

To focus on medical child abuse as an entity and emphasize its epidemiology, clinical presentations, prevention, and management.

Results

In the UK, the annual incidence of medical child abuse in children below one year increased to 3:100,000, while its prevalence in Arabs, including Iraq, is ambiguous due to lack of evidence and improper clinician's awareness. The mean age at diagnosis is 14 months to 2.7 years. Female caregivers are the most common offenders. Clinically, medical child abuse

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Multifocus Images Fusion Based On Homogenity and Edges Measures
...Show More Authors

Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,

... Show More
View Publication Preview PDF
Crossref