26 research outputs found

    The impact of financial crises on the market value of the claim rights during moratorium on bankruptcy in Russian market

    Get PDF
    This research studies the impact of the financial crisis and the moratorium on bankruptcy on the final value of the bank's claim rights. The relevance comes from the fact that a lot of problems appear in the time of crises to apply the process of moratorium in case of bankruptcy. The aim of this research will be finding a mechanism to evaluate the value of claims to help the company in the process of bankruptcy. The methodology that will be used in this research depends on the cash flow that will be generated from the debtors to evaluate the amount of money that they can obtain to complete the process of bankruptcy. The data will be collected from the Russian companies which are exposed to bankruptcy from 2013 to 2022. The results showed that the cash inflows generated from the debtors who are exposed to bankruptcy will be lower than other debtors and that will effect on the process of bankruptcy. To understand the calculation model, the income method of business valuation used in determining the market value of claims is described. The rules regulated the terms and costs of the bankruptcy procedure, calculated in the model, are described

    Sustainability of the banking system and the role of monetary policy: Financial liberation in Iraq

    Get PDF
    The Iraqi economy is rentier and heavily reliant on oil revenues because oil prices are volatile and subject to supply and demand on the global market, causing money supply instability. A prudent monetary policy must be developed in the face of macroeconomic policies, even partial ones, in order to reduce inflationary pressures and achieve both internal and external monetary stability. Iraq also lacks a clear economic strategy and the country's economy is still susceptible to decision-makers’ whims and the demands of international organizations. It is, therefore, essential to discuss monetary policy's fundamental and successful role in managing the sustainability of the economy through its solid and practical tools. Iraq's monetary authorities scrambled to ensure the nation's economic stability through the use of monetary tools as the country's economic system started to shift towards a market economy in 2003, depending on supply and demand forces to manage the economy. The Central Bank uses tools of monetary policy, which are based on keeping an eye on the money supply and pursuing long-term objectives, to achieve the policy objective of economic stability. The goals of economic stability, according to economist Nicolas Kaldor, are to boost economic growth, achieve full employment, establish external balance, and fight inflation. This study examined the hypothesis that, between 1990 and 2020, monetary policy contributed to Iraq's economic stability using co-integration tests, fully-corrected least-squares techniques, and dynamic standard least-squares. The positive effects of monetary policy on economic variables, particularly economic stability, were demonstrated by the influence of foreign currency reserves on an improved current account balance, price stability, and a relative decline in unemployment rates. The GDP and the current account balance positively affected economic stability indicators, while the money supply adversely impacted most of them. To improve the balance of payments and encourage economic growth, investments should be made in the manufacturing and agricultural sectors

    Provably secure and efficient audio compression based on compressive sensing

    Get PDF
    The advancement of systems with the capacity to compress audio signals and simultaneously secure is a highly attractive research subject. This is because of the need to enhance storage usage and speed up the transmission of data, as well as securing the transmission of sensitive signals over limited and insecure communication channels. Thus, many researchers have studied and produced different systems, either to compress or encrypt audio data using different algorithms and methods, all of which suffer from certain issues including high time consumption or complex calculations. This paper proposes a compressing sensing-based system that compresses audio signals and simultaneously provides an encryption system. The audio signal is segmented into small matrices of samples and then multiplied by a non-square sensing matrix generated by a Gaussian random generator. The reconstruction process is carried out by solving a linear system using the pseudoinverse of Moore-Penrose. The statistical analysis results obtaining from implementing different types and sizes of audio signals prove that the proposed system succeeds in compressing the audio signals with a ratio reaching 28% of real size and reconstructing the signal with a correlation metric between 0.98 and 0.99. It also scores very good results in the normalized mean square error (MSE), peak signal-to-noise ratio metrics (PSNR), and the structural similarity index (SSIM), as well as giving the signal a high level of security

    Prognostic significance of TRAIL death receptors in Middle Eastern colorectal carcinomas and their correlation to oncogenic KRAS alterations

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Tumour necrosis factor-related apoptosis-inducing ligand (TRAIL) is a member of the tumour necrosis factor cytokine family that induces apoptosis upon binding to its death domain containing receptors, TRAIL receptor 1 (DR4) and TRAIL receptor 2 (DR5). Expression of TRAIL receptors is higher in colorectal carcinoma (CRC) as compared to normal colorectal mucosa and targeted therapy with TRAIL leads to preferential killing of tumor cells sparing normal cells.</p> <p>Methods</p> <p>We investigated the expression of TRAIL and its receptors in a tissue microarray cohort of 448 Middle Eastern CRC. We also studied the correlation between TRAIL receptors and various clinico-pathological features including key molecular alterations and overall survival.</p> <p>Results</p> <p>CRC subset with TRAIL-R1 expression was associated with a less aggressive phenotype characterized by early stage (p = 0.0251) and a histology subtype of adenocarcinomas (p = 0.0355). Similarly CRC subset with TRAIL-R2 expression was associated with a well-differentiated tumors (p < 0.0001), histology subtype of adenocarcinomas (p = 0.0010) and tumors in left colon (p = 0.0009). Over expression of pro apoptotic markers: p27<sup>KIP1 </sup>and KRAS4A isoforms was significantly higher in CRC subset with TRAIL-R1 and TRAIL-R2 expression; TRAIL-R1 expression was also associated with cleaved caspase-3(p = 0.0011). Interestingly, TRAIL-R2 expression was associated with a microsatellite stable (MS--S/L) phenotype (p = 0.0003) and with absence of KRAS mutations (p = 0.0481).</p> <p>Conclusion</p> <p>TRAIL-R1 expression was an independent prognostic marker for better survival in all CRC samples and even in the CRC group that received adjuvant therapy. The biological effects of TRAIL in CRC models, its enhancement of chemosensitivity towards standard chemotherapeutic agents and the effect of endogenous TRAIL receptor levels on survival make TRAIL an extremely attractive therapeutic target.</p

    Effect of Pulverization Tools and Deficit Irrigation Treatments on Water Use Efficiency and Yield of Barley

    Get PDF
    Under limited water resources in arid and semi-arid environments, the great challenge of developing agriculture is to increase water use efficiency. For that field experiment have been conducted during autumn season of 2011-2012 at the experimental farm, Department of Agricultural Machines Science, College of Agriculture –University of Baghdad. A field study have been carried out to determine the effect of pulverization tools and irrigation scheduling on growth parameters and Water Use Efficiency (WUE) of barley crop for optimum production. Pulverization tools treatments are (rotivator, disk harrow and spring cultivator). Deficit irrigation including omitting two irrigation at growth stage (T1), flowering stage (T2) and growth grain stage (T3), as well as the full irrigation treatment (control) (T0). Irrigation is applied at 55% depletion of available water. Plant growth parameter of barley is significantly affected by the different irrigation treatments and pulverization tools. The mean values of the pulverization tools shows that the plant height (cm) decreased from 86 to 79 and 76, No. of spike/ m2 from 582 to 569 and 530, biological yield (t/ha) from 16.64 to 16.13 and 14.72 and the grain yield (t/ha) from 5.36 to 4.81 and 4.22 at spring cultivator, disk harrow and rotivator, respectively. The deficit-irrigated treatments required less water than the control-irrigated treatments,have been recorded 320 – 369 mm and 373 – 411 mm, respectively. The mean ETa measured during the season is 370 mm for spring cultivator and 391, 400 mm for the disk harrow and rotivator, respectively. The highest actual evapotranspiration is measured for the rotivator + control irrigation treatment (438 mm), while the lowest value have been recorded 347 for spring cultivator + deficit irrigation (T3). The water use efficiency of all the treatment ranges from 0.94 to 1.53 kg m-3 while the irrigation water uses efficiency ranges from 1.01 to 1.66 kg m-3

    نموذج مقترح للضريبة على الشركات النفطية العاملة في العراق

    No full text
    تهدف الدراسة إلى تنفيذ المقترحات المطروحة في العمل لزيادة كفاءة الإدارة الاستراتيجية للسياسة المالية للدولة وذلك من خلال الدور الذي تلعبه الإدارة الاستراتيجية في المؤسسات المالية من خلال السيطرة والتحكم بأدوات السياسة المالية لغرض وضع الموازنة العامة للدولة في تقدير وتنفيذ الموازنة من أجل تحقيق الأهداف الاقتصادية التي تصبو لتحقيقها السلطة التنفيذية، والتي يصعب تحقيقها بسبب الاعتماد الكلي على الإيرادات النفطية والحاجة الى تعدد مصادر الدخل تم العمل على وضع أنموذج لفرض الضرائب على الشركات النفطية العاملة في العراق حيث لوحظ عدم فاعلية النظام الضريبي الحالي لذلك اقترحنا ضرورة الاعتماد بوضع خطط إستراتيجية واضحة تساعد في تحقيق أهداف السياسة المالية والرفاهية الاجتماعية وتحسين العمل بالقواعد الضريبية

    Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing

    No full text
    Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attacks. Enc-DNS-HTTP is based on the distribution of a web server public key, which is transferred via a secure communication between client and a Domain Name System (DNS) server. This key is used to encrypt client-server communication. The scheme is implemented in the C programming language and tested on a Linux platform. In comparison with Apache HTTPS, this scheme is shown to have more effective resistance to attacks and improved performance since it does not involve a high number of time-consuming operations

    Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing

    No full text
    Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attacks. Enc-DNS-HTTP is based on the distribution of a web server public key, which is transferred via a secure communication between client and a Domain Name System (DNS) server. This key is used to encrypt client-server communication. The scheme is implemented in the C programming language and tested on a Linux platform. In comparison with Apache HTTPS, this scheme is shown to have more effective resistance to attacks and improved performance since it does not involve a high number of time-consuming operations

    A Lightweight Scheme to Authenticate and Secure the Communication in Smart Grids

    No full text
    Self-reconfiguration in electrical power grids is a significant tool for their planning and operation during both normal and abnormal conditions. The increasing in employment of Intelligent Electronic Devices (IEDs), as well as the rapid growth of the new communication technologies have increased the application of Feeder Automation (FA) in Distribution Networks (DNs). In a Smart Grid (SG), automation equipment, such as a Smart Breaker (SB), is used. Using either a wired or a wireless network or even a combination of both, communication between the Control Center (CC) and SBs can be made. Nowadays, wireless technology is widely used in the communication of DNs. This may cause several security vulnerabilities in the power system, such as remote attacks, with the goal of cutting off the electrical power provided to significant consumers. Therefore, to preserve the cybersecurity of the system, there is a need for a secure scheme. The available literature investments proposed a heavyweight level in security schemes, while the overhead was not considered. To overcome this drawback, this paper presents an efficient lightweight authentication mechanism with the necessary steps to ensure real-time automatic reconfiguration during a fault. As a first stage, authentication will be made between CC and SB, SB then sends the information about its status. To ensure the integrity of the authentication exchange, a hash function is used, while the symmetric algorithm is used to ensure privacy. The applicability of the suggested scheme has been proved by conducting security performance and analysis. The proposed scheme will be injected on ABB medium voltage breaker with the REF 542plus controller. Therefore, the probable benefit of the suggested scheme is the contribution to provide more flexibility for electrical utilities in terms of reducing the overall computational overhead and withstanding to various types of attacks, while also opening new prospects in FA of SGs
    corecore