Preferred Language
Articles
/
jeasiq-983
Financial Depth Measurements / Analytical Study in Selected Countries for the Period 1980-2008
...Show More Authors

This research deals with the most important indicators used to measure the phenomenon of financial depth, beyond the traditional indicators, which are called quantitative indicators, which is shown to be inadequate to show the facts accurately, but it may come in the results of a counterfactual, although reliable in econometric studies done in this regard.

Therefore, this research has sought to put forward alternative indicators, is the structural indicators, and financial prices, and availability of financial instruments, and cost of transactions concluded, in order to measure the phenomenon of financial depth.

After using and analyzing data collected from countries the research sample, which included Japan, China and Iraq, which have been carefully selected to show the countries varied in the level of financial depth, in order to give the results of analytical variety explain all of reality, the time period 1980-2008, as averages, it was found that these standards alternative is better or closer to highlight the fact, it was found that Japan sits on the summit of the sample selected in terms of depth financial situation, followed by China with Iraq at the end.
This basic finding of the research consistent with the hypothesis, which confirmed the importance of alternative measures to highlight the phenomenon of financial depth are more accurate and realistic.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Six-coordinate oxime-imine cobalt(III) complexes with amino acid co-ligands; synthesis and characterisation
...Show More Authors

In this publication, several six coordinate Co(III)-complexes are reported. The reaction of 2,3-butanedione monoxime with ethylenediamine or o-phenylenediamine in mole ratios of 2:1 gave the tetradentate imine-oxime ligands diaminoethane-N,N`-bis(2-butylidine-3-onedioxime) H2L1 and o-phenylenediamine-N,N`-bis(2-butylidine-3-onedioxime), respectively. The reaction of H2L1 and H2L2 with Co(NO3)2, and the amino acid co-ligands (glycine or serine) resulted in the formation of the required complexes. Upon complex formation, the ligands behave as a neutral tetradantate species, while the amino acid co-ligand acts as a monobasic species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Fast encoding algorithm based on Weber's law and Triangular Inequality Theorem
...Show More Authors

In the present work, an image compression method have been modified by combining The Absolute Moment Block Truncation Coding algorithm (AMBTC) with a VQ-based image coding. At the beginning, the AMBTC algorithm based on Weber's law condition have been used to distinguish low and high detail blocks in the original image. The coder will transmit only mean of low detailed block (i.e. uniform blocks like background) on the channel instate of transmit the two reconstruction mean values and bit map for this block. While the high detail block is coded by the proposed fast encoding algorithm for vector quantized method based on the Triangular Inequality Theorem (TIE), then the coder will transmit the two reconstruction mean values (i.e. H&L)

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Properties of a Complete Fuzzy Normed Algebra
...Show More Authors

          The aim of this paper is to translate the basic properties of the classical complete normed algebra to the complete fuzzy normed algebra at this end a proof of multiplication fuzzy continuous is given. Also a proof of every fuzzy normed algebra  without identity can be embedded into fuzzy normed algebra  with identity  and  is an ideal in  is given. Moreover the proof of the resolvent set of a non zero element in complete fuzzy normed space is equal to the set of complex numbers is given. Finally basic properties of the resolvent space of a complete fuzzy normed algebra is given.

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 13 2024
Journal Name
مجلة واسط للعلوم الریاضیة
تأثير تنوع تدريبات الاستطالة العضلية للذراعين بشدة عالية في الكفاءة القاعدية الخلوية والتنفس الرئوي لمبارزي سلاح الشيش الشباب بدلالة تكنولوجيا الرياضة
...Show More Authors

The research aimed to prepare muscle elongation exercises for the arms with high intensity in which the training methods for young blind fencers vary, and to identify the effect of the diversity of muscle elongation exercises for the arms with high intensity on the cellular basal efficiency (lactic acid and sodium bicarbonate) and pulmonary respiration for young blind weapon fencers in terms of sports technology, and the experimental approach was adopted by designing the experimental and equal control groups, and the limits of the research community were represented by young fencers with shish weapon under the age of (20) years in the Army Sports Club, whose number is Total (15) swordsmen, continuing their training for the sports season (20

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Bandwidth Improvement of a Cone-Inverted Cylindrical and Cross Hybrids Dielectric Resonator Antennas
...Show More Authors

In this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
"Khurasan statehood" : new centralization of ISIS and limits of incursion and development
...Show More Authors

Abstract This study aims to discover the ways that adopted by extremism to expand to new geographical areas, in order to spread out its ideology, which led to create new geo-strategic zone, aims to recognize ISIS’s strategy to move towards new geographic locations and the motivations behind these transformations, the study also analyses all aspects of this strategy, the group’s relationship with other terrorist groups in these areas and limits of the competition between them. The study also highlights the factors that have led ISIS to move to new geographical areas and its techniques to control them.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More