Monetary sterilization policies are one of the modern trends of monetary policy in rentier countries, specifically to confront the positive shocks in foreign assets flowing into the national economy and the impact of these shocks on monetary and real variables. And that the Central Bank contains these emergency increases in foreign exchange with the aim of avoiding the impact of this increase on the official local currency through its three main monetary tools, which are the rediscount rate, the legal reserve, and open market operations. As well as the relationship between the central bank and the objective of external balance, which is reflected in the balance of payments balance, the central bank resorts to managing the exchange rate to isolate the effect of foreign exchange from domestic currency, and avoiding the impact of positive shocks on foreign exchange means making it neutral in affecting domestic balances through foreign currency, and the neutrality of money means isolating the effect of money in causing undesirable price changes, because price changes impede the efforts of the Central Bank in sterilization operations. Thus, the central bank may enter into a vicious circle from which it does not come out in the long term, because usually the price changes are faced by the central bank with the mechanism of raising the interest rate, and the latter stimulates the entry of new foreign assets with the aim of benefiting from the high interest. Thus, the suffering of the central bank continues in monetary sterilization in rentier economies. Specifically, we will go through this suffering in the rentier Iraqi economy in this research.
The study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
This research was aimed to study the exposure of Razzazah Lake to major hydrological changes in recent years as a result of natural climatic changes and drought, high evaporation in lake due to stop discharge from Habbaniyah Lake by Al- majera channel. During 2019, we collected surface water samples at three locations, and three samples from groundwater, in addition one samples from each location Imam Ali Drop and Sewage water of Karbala. The Results show that the heavy isotopes in lake and groundwater well are enriched during the warm period, and depleted during the cold period. Chemically, The dominant cations and anions in Al-Razzaza lake water are mainly of in Order Ca > Na > Mg and Cl>SO4 and the water
... Show MoreThe purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra
... Show MoreRelease of industrial effluents comprising dyes in water bodies is one of the foremost causes of water pollution. Therefore, the proper and proficient treatment of these dyes contaminated left-over material before their release is crucial. Herein, an eco-friendly biological macromolecule Gum-Acacia (GA) integrated Fe3O4 nanoparticles composite hydrogel was manufactured via co-precipitation technique for effective adsorption of Congo red (CR) dye existing in water bodies. The as-prepared magnetic GA/Fe3O4 composite hydrogel was characterized by FTIR, XRD, EDX, VSM, SEM, and BET techniques. These studies discovered the fruitful fabrication of biodegradable magnetic GA/Fe3O4 composite hydrogel possessing porous structure with large surface are
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreObjective: This in vitro study is aimed to compare and evaluate the cyclic fatigue of four varying NiTi rotary instrumentation systems. Method: In this study, four types of rotary files were used in four groups (10 files for each group), namely, Group A: Wave One Gold; Group B: AF Blue R3; Group C: One Curve; Group D: F6 SkyTaper. These groups were evaluated by a cyclic fatigue apparatus to measure cyclic fatigue resistance within the artificial metallic simulating canal that has a 60 angle of curvature, the curvature radius was 5 mm, whereas the inner diameter of the canal was 1.5 mm. All the files were rotated in artificial canals until they fracture. The resistance to cyclic fatigue was determined by counting the number of cycles to frac
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More