The developing countries, like our country Iraq suffer from deep comprehensive structural crisis, manifestations and a clear imbalance between the demand and the supply sides. The overall imbalance in the external balance. As a consequence, this caused the accumulation of foreign debts or failure in the implementation of economic development programs. The countries which are forced to resort to the International Monitoring Funds, and the World Bank for assistance and to express an opinion on policies that include restrictions controls that belong to the monetary, and fiscal side group, imposed on the economies crisis, as a condition for returning to normal which called reform programs. The organize of the events of radical changes in the economic structure towards the rule of the free market system trends in the domestic and international economic activity, carried out by the top financial institutions in the country like the Central Bank, for example, in order to improve the complete level of demand commensurate, with the full level of supply and return to the state of economic balance. The structural adjustment programs, that represents the advanced phase of the restoration of capitalism in which direct changes in agreement with those of international institutions, and under strict supervision conducted restructuring process. The structural adjustment policies programs, or called the government programs, as a prelude to conclude agreements on debt rescheduling, or as a kind of show good intentions and behavior begins her request.The standard requirements for the procedures of the International Monetary Fund, including application procedures for government authorities for tax, and financial sector reform, restructuring state-owned enterprises, and macroeconomic stability.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreTo translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThis paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the
... Show More
The research aims to identify the role of educational institutions in instilling the values of integrity among emerging in word and deed and identifies research in educational institutions that have a significant impact in the emerging figures such as (family , school , media , mosque , civil society organizations , youth clubs .Have been identified the most important search terms of ( values ,educational institutions , Integrity) also touched search particular concern values education and its impact on emergent behavior , then separate search in the role of each educational institution to establish moral values in general and the values of integrity, particularly in the behavior of emerging
دور الإدارة المصرفية الرشيدة في ضمان مخاطر الائتمان المصرفي
Psychological Counseling Services occupies a high position in the developed countries and that for its psychologist services for different sectors of the community members, and has been popularized until recently the wrong concept of the effect, that the psychological service is provided only to the owners of behavior is normal only, Vantage him neglect to provide psychological services a large segment of the community members who are in dire need of these services.
The counseling service is part of a global social movement seeking to emphasize the quality of life of the human and the emphasis on the value and dign
... Show More