This research aims to demonstrate the nature and concept of the Corona pandemic, its implications for the global economy, and the management and performance of companies in particular. Additionally, the research intends to measure the impact of the Corona pandemic on companies' financial performance. Listed on the Iraqi Stock Exchange, which has finished compiling its year-end financial statements for 2019-2020. The investigation arrived at several findings, the most significant of which was that most businesses were not prepared for such a crisis technologically or to develop human resources to deal with this pandemic. In addition, most companies experienced a decrease in their financial performance as a direct result of the Corona pandemic, as indicated by the findings of the investigated financial performance indicators. Finally, the research resulted in several recommendations, the most important of which is that businesses should invest more in technology and the development of human resources to prepare for such crises in the future and that the government should provide support for companies that were impacted by the pandemic by waiving taxes, removing customs duties, and providing banking facilities from the Central Bank.
This paper analyses the relationship between selected macroeconomic variables and gross domestic product (GDP) in Saudi Arabia for the period 1993-2019. Specifically, it measures the effects of interest rate, oil price, inflation rate, budget deficit and money supply on the GDP of Saudi Arabia. The method employs in this paper is based on a descriptive analysis approach and ARDL model through the Bounds testing approach to cointegration. The results of the research reveal that the budget deficit, oil price and money supply have positive significant effects on GDP, while other variables have no effects on GDP and turned out to be insignificant. The findings suggest that both fiscal and monetary policies should be fo
... Show More
The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th
... Show MoreIn the drilling and production operations, the effectiveness of cementing jobs is crucial for efficient progress. The compressive strength of oil well cement is a key characteristic that reflects its ability to withstand forceful conditions over time. This study evaluates and improves the compressive strength and thickening time of Iraqi oil well cement class G from Babylon cement factory using two types of additives (Nano Alumina and Synthetic Fiber) to comply with the American Petroleum Institute (API) specifications. The additives were used in different proportions, and a set of samples was prepared under different conditions. Compressive strength and thickening time measurements were taken under different conditions. The amoun
... Show MoreThe current study aims to develop a teaching design in accordance with cluster thinking strategies and explore the effect of this teaching design on students’ achievement in science. To this end, the null hypothesis was adopted: there is no statistically significant difference at the level of (0, 05) between experimental group who adopted the teaching design in learning science and control group who follow the traditional method in learning the same subject. To test the null hypothesis, total of (74) students from Al-Alaama Hussain Mahfooth intermediate school were selected intentionally for the academic year 2016-2017. The sample divided into two equal groups when all the variables (age, prior achievement of science,
... Show MoreThe present work included qualitative study of epiphytic algae on dead and living stems, leaves of the aquatic plant Phragmitesaustralis Trin ex Stand, in Tigris River in AL- Jadria Site in Baghdad during Autumn 2014, Winter 2015, Spring 2015, and Summer 2015. The physical and chemical parameters of River’s water were studied (water temperature, pH, electric conductivity, Salinity, TSS, TDS, turbidity, light intensity, dissolve oxygen, BOD5, alkalinity, total hardness, calcium, magnesium and plant nutrient). A total of 142 isolates of epiphytic algae were identified. Diatoms were dominant by 117 isolates followed by Cyanobacteria (13isolates), Chlorophyta (11 isolates) and Rhodophyta (1 isolate), Variations in the isolates number were rec
... Show MoreThe increased applications of technology in the field of architecture, especially digital technology and aspects of automation, have made a major impact on various aspects of local architecture, especially the traditional ones. As these technologies have succeeded in integrating many technological applications in many traditional and heritage buildings and taking them to more complex uses. And included in it characteristics that were not contained, therefore the research problem was concentrated in the absence of a holistic view of the role of the aspects of automation as a technological and design effect and its mutual effects on traditional buildings (especially the traditional Bagh
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More