Preferred Language
Articles
/
joe-1839
Developing a Proposed System to Organize the Investment Opportunities in Iraq
...Show More Authors

......

The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was the slow and routine administrative procedures. Therefore, the main objective of the research is to identify the most important constraints facing the investment process in Iraq and to develop a proposed system to organize the procedures for applying for investment opportunities, given the importance of long-term investment, the importance of the referral stage, and the selection of the competent investor who meets the criteria required for the success of the investment project. The researcher concluded that many factors impact the failure of investment projects, which must be addressed for the success of these projects, as management systems and computer technology programs greatly organize investment procedures, save time and reduce routine and slow procedures.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 27 2018
Journal Name
Wireless Communications And Mobile Computing
Developing a Video Buffer Framework for Video Streaming in Cellular Networks
...Show More Authors

This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
COLLABORATIVE WRITING AS A MEANS IN DEVELOPING EFL LEARNERS’ WRITING PERFORMANCE
...Show More Authors

Collaborative learning is a way that prepares students practically for real-world applications. Working together as teamwork to execute various writing skills is essential in most professions since it increases the level of experience. Thus, the current study aims to identify the role collaborative writing in developing students' level of performance in writing. It is qualitative in nature since the researcher depended on the extant literature in achieving the objective of the study. The researcher touched upon related theories that addressed Collaborative learning, categories, and problems .It concluded that collaborative writing increases the students’ self-confidence, self-esteem, creativity, and motivation through the interact

... Show More
View Publication
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Legal Sciences
Judicial Tools in Developing Civil Law Rules – France as a Model
...Show More Authors

Despite the principle of separation of powers brought by the French Revolution, which entrusted the task of drafting legislation and its amendment to the legislative authority and the task of settling disputes and settling them in the judiciary. However, since that date, the French judiciary has played a major role in the development of French civil law (In spite of all the economic and social developments that have taken place in French society throughout these years) since its promulgation until February of 2016, the date of the Legislative Decree No. 131 of the year 2016 A modification is the largest in the history of the French Civil Code (which was the judicial precedents in which a significant impact), was assisted by the French judic

... Show More
View Publication
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Using Smart Control System to Enhancement the Split Air Conditioning System Performance
...Show More Authors

In IRAQ, the air conditioners are the principal cause of high electrical demand. In summer, the outer temperature sometimes exceeds 500C which significantly effects on the A/C system performance and power consumed. In the present work, the improvement in mechanical and electrical performance of split A/C system is investigated experimentally and analytically. In this paper, performance and energy saving enhancement of a split-A/C system was experimentally investigated to be efficiently compatible with elevated temperature weathers. This improvement is accomplished via Smart Control System integrate with Proportional-Integral- Differential PID algorithm. The PIC16F877A micro-controller has been programmed with the PID and PWM c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of financial investments using financial indicators Applied in the Middle East Bank of Iraq for investment For the fiscal period 2007-2009
...Show More Authors

The research explain the analysis of finance investments through  analyze the finance tables for commercial banks, by using the pointers to indicate the limits of economical benefit for these investments, and fix the negative deviations and as well positive, for the purpose of  diagnostic the negative (disadvantage) and develop the advantage deviation, For the importance of finance investments in the development operation and economical growth, further to that the finance investments is represent one of the most activities in the commercial banks in which aim the adequate incomes as a result of the commercial banks act to receipt the banks deposits and then make it growth and develop through  commercial advantage o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The relationship of the investment environment with the indicators of the national economy
...Show More Authors

The investment environment is the incubator for all types of domestic and foreign investments, so if their determinants are encouraging, they increase the levels of investment flows and vice versa, as there is a relationship between the nature of the investment environment and the level of investment flows, and the determinants of the investment environment are numerous and the most important of which are security and political stability, and economic and financial factors that include relative stability In the exchange rate and inflation rates, the availability of banks and their development, transparency and integrity in administrative dealings and the lack of prevalence of administrative and financial corruption, and the clari

... Show More
View Publication Preview PDF