Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve (OBEC, 2013:21) as well as the size of the reserves of natural gas (Natural Gas) and deep (3,158) billion gallons, enriched by Iraq of the importance of this resource strategic, but unlike the oil-producing countries, Iraq was based on oil revenues in the dam operating expenses, and neglected the rest of the economic sectors. Which led to be among the consuming nations and not producing. Than heavier the general budget, and to make matters worse, is the international claims of Iraq and committed by Iraq before 2003, any of the former regime, governed by international law, which separated the heavily indebted, have created justifications to lay hands on oil revenues by the coalition Provisional Authority and in accordance with UN Security Council resolutions related thereto, and that on the track was set up the Development Fund for Iraq, adopting a fund for the deposit of all revenues from oil sales in the international market for the purposes of restructuring the Iraqi economy and contribute to the economic and social development and bridging the humanitarian needs for the Iraqi people, and the payment of international claims, which set up because of the wrong policies it is the purpose of showing off the power at the expense of the interests of the country and then was McCann!
The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreElastic magnetic electron scattering form factors in Ca-41 have been investigated. 1f7/2 subshell has been adopted as a model space with one neutron, and Millinar, Baymann and Zamick 1f7/2 model space effective interaction (F7MBZ) has been used as a model space effective interaction to generate the model space vectors for the M1, M3, M5, M7, and total form factors. Discarded space (core and higher configuration orbits) have been included through the first order perturbation theory to couple the partice-hole pair of excitation with 2ћω excitation energy in the calculation of the form factors and regarding the realistic interaction density dependence M3Y as a core polarization interaction with five sets of modern fitting parameters. Fina
... Show MoreComprehensive automobile insurance is considered as an important insurance which is managing by National Insurance Company due to the continuous accidents the company is endeavoring to this market not for trading motives only but also to increase the insurance awareness of people and insurance benefit for other insurance portfolios .On this basis the researcher had chosen her subject ( obstacles in marketing comprehensive automobile Insurance policy ) the company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the mainly connected with the reduction of marketing programmes of the company . the aim of this study is to shade the light upon the internal factors
... Show MoreCanonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.
In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe
... Show MorePost-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and
... Show MoreUnter Exilliteratur versteht man „die literarische Produktion von Autoren, die wegen politischer, religiöser oder rassistischer Verfolgung gezwungen sind, sich an einem anderen als dem von ihnen gewünschten Lebens- und Arbeitsort aufzuhalten.“[1] Deswegen unterscheidet sich „Migration“ von „Exil“ dadurch, dass sie freiwillige Auswanderung ist. Bereits in der Antike und auch im Mittelalter gab es Schriftsteller, die vor Zensur oder politischer Verfolgung ins Exil geflohen sind, wie zum Beispiel der griechische Satiriker des
... Show MoreInelastic transverse magnetic dipole electron scattering form
factors in 48Ca have been investigated through nuclear shell model
in an excited state energy Ex= 10.23 MeV which is so called
"mystery case" with different optional choices like effective
interaction, restricted occupation and core polarization interaction.
40Ca as an inert core will be adopted and four orbits with eight
particles distributed mainly in 2p1f model space and in some extend
restricted to make sure about the major accuse about this type of
transition. Theoretical results have been constituted mainly with
experimental data and compared with some important theoretical
results of the same transition.
An experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThe research covered Creeds in Assyrian Sculpture
(Assyrian Sculptures) The ability of the Assyrian sculptor to
contrast these creeds and tendon in Assyrian sculpture, in various variations, including prominent and stereotypical plaques and winged bulls, in addition to the obelisks and hunting scenes of the Lionسion hunting scenes of the black
... Show More