The monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to actualize the adopted goals by the state and the relative closeness between monetary policy and fiscal policy objectives that requires relationship between two policies. Also, in order to achieve the goal of stability and promote economic growth within the tax multiplier. Multiplier of government spending is aiming at the goal of stability automatically and the allocation or distribution of economic stability through a basic introduction of the aim and objective of allocating resources to the required fields. In this vein, the objectives of the fiscal policy can be brought up spontaneously with the provisions of side and control effects which are in consonant with the outcome received in terms of economic cycle. The research showed that the impact of monetary policy in Iraq is insignificant on non-oil gross domestic product through a multiplier of monetary policy (K) and the flexibility of non-oil gross domestic product for money supply (E). Similarly, the impact of fiscal policy on non-oil gross domestic product through the fiscal policy multiplier (K) and the flexibility of non-oil gross domestic product for the government to spend are insignificant
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThis work presents an investigation on the fabrication and characterization of Fe doped zeolitic imidazolate framework (ZIF-8) of 1:1 M ratio of Zn:Fe (Fe/Zn-ZIF-8) and adsorption performances of acquired materials. The synthesized Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 materials were characterized for the phase structure, morphology, elemental analysis and surface area by using X-ray diffraction (XRD), Field emission scanning electron microscope (FESEM), Energy Dispersive X-Ray (EDX), and BET surface area, respectively. The results revealed the adsorption capacity was enhanced by incorporation of Fe into ZIF-8 structure. The CR dye adsorption capacities were 287, 219, and 412 mg/g for Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 adsorbers, respectivel
... Show MoreSoil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreIn this work pyrazolin derivatives were prepared from the diazonium chloride salt of 4-aminobenzoic acid. Azo compounds were prepared from the reaction of an ethanolic solution of sodium acetate and calculated amount of active methylene compound namely, acetyl acetone to obtain the corresponding hydrazono derivative (1). Cyclocondensation reaction of compounds (1) with hydrazine hydrate and phenyl hydrazine in boiling ethanol affording the corresponding pyrazoline-5-one derivatives of 4-aminobenzoic acid (2,3). Then compound (3) was reacted with thionyl chloride to give the corresponding acid chloride derivative(4), followed by conversion into the corresponding acid hydrazide derivative (5) carboxylic acid thiosemicarbazide (11), esters
... Show MoreThe paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera
... Show MoreBackground: Anaemia is a major public health concern and is one of the most prevalent health issue in women within reproductive age group.
Objective: to assess maternal knowledge related to anaemia during pregnancy.
Type of the study: A cross –sectional study.
Method: The study including 200 mothers who attended selected primary health care centres, Baghdad during November and December 2015, they completed a previously prepared questionnaire coveringsocio-demographic characteristics and knowledge regarding anaemia in 4 main domains. The responses were analysed by using frequency, percentage and percent score for each statement a
... Show MoreSolid‐waste management, particularly of aluminum (Al), is a challenge that is being confronted around the world. Therefore, it is valuable to explore methods that can minimize the exploitation of natural assets, such as recycling. In this study, using hazardous Al waste as the main electrodes in the electrocoagulation (EC) process for dye removal from wastewater was discussed. The EC process is considered to be one of the most efficient, promising, and cost‐effective ways of handling various toxic effluents. The effect of current density (10, 20, and 30 mA/cm2), electrolyte concentration (1 and 2 g/L), and initial concentration of Brilliant Blue dye (15 and 30 mg/L) on