Preferred Language
Articles
/
uxfguJIBVTCNdQwCdb7c
Comparative Analysis of Economic Policy Stability between Monarchical and Republican Systems: A Theoretical Fundamental Research
...Show More Authors

Comparative Analysis of Economic Policy Stability between Monarchical and Republican Systems: A Theoretical Fundamental Research

Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of electronic payment systems on the effectiveness of monetary policy
...Show More Authors

Information and Communication Technology  revolution has led to the emergence of electronic payment systems and their means And that the replacement of these modern means replace the traditional means (legal money) issued by the Central Bank has influenced the performance of monetary policy, especially that monetary policy is one of the most important policies used to achieve economic stability ,  The aim of the research is To know the impact of electronic payment systems on the tools of monetary policy as these means, such as cards and electronic money issued by credit institutions and companies, that is, the Central Bank is not responsible for issuance and spread And the lack of regulation by the Central Bank will lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Us-china Public Administration
Victims of Terrorism between Compensation and Loss of Rights: A Comparative Study between Iraqi Law and French Law
...Show More Authors

The problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which

... Show More
View Publication
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Use some of the quality tools to improve the health service: Comparative research between Baghdad's and Yarmouk hospital educational
...Show More Authors

Abstract

This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 04 2022
Journal Name
Trends In Sciences
Asymptotic Stability of 3D Stochastic Positive Linear Systems with Delays
...Show More Authors

The article emphasizes that 3D stochastic positive linear system with delays is asymptotically stable and depends on the sum of the system matrices and at the same time independent on the values and numbers of the delays. Moreover, the asymptotic stability test of this system with delays can be abridged to the check of its corresponding 2D stochastic positive linear systems without delays. Many theorems were applied to prove that asymptotic stability for 3D stochastic positive linear systems with delays are equivalent to 2D stochastic positive linear systems without delays. The efficiency of the given methods is illustrated on some numerical examples. HIGHLIGHTS Various theorems were applied to prove the asymptoti

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology
Color stability of different aesthetic resin composite materials: A digital image analysis
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Jan 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Color Stability of Different Aesthetic Resin Composite Materials: A Digital Image Analysis
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri May 18 2018
Journal Name
International Journal Of Simulation: Systems, Science & Technology
A Review of Advances in Pressurizer Response Research for Pressurized Water Reactor Systems
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of monetary policy in the aggregate indicator of banking stability in Iraq: An applied research in the Central Bank of Iraq for the period (2010 - 2017)
...Show More Authors

The research sought to demonstrate the effectiveness of monetary policy in banking stability by measuring the impact of monetary policy in the composite index of banking stability in Iraq for the period 2010/2017, as the stability of the financial system is one of the main objectives that the Central Bank is keen to achieve along with other objectives to ensure the performance Effective for all economic units, this is what prompted the central banks to give more attention in ensuring the safety, durability and stability of their financial systems, and the increasing interest by the Central Bank of Iraq in the subject of financial stability stems from its responsibility in ensuring a sound and stable financial system. Maintain it and mini

... Show More
View Publication Preview PDF