The exchange rate is the backbone of any economy in the world, whether developed or developing, where most countries adopted many policies, in order to ensure the stability of the exchange rate of the currency, because of its importance as a link between the local economy and the others ,And it contribute in the achievement of internal and external balance and despite the many different factors that affect it, but there is wide consensus on the effectiveness of the role of spending and the currency window in the exchange rate of the Iraqi dinar, especially in the Iraqi economy, effectiveness As the increase in government spending lead to an increase in the supply of money and increase domestic demand and high pr
... Show MorePersonality regard as one of the human soul pillars that has been built throughout the life of people, starting from the fertilizing process to different stages of people ages. Over time, numerous scientific studies have shown that fetus has the ability to hear and feel and he is being stereotyped since the first stages of formation. Accordingly, the process of forming human personality set up since that date. Besides, the socialization means that take different resources to enhance human personality such as holy Quran, school, social media, and social environment. The emergence of social media made the world as a small village which gives the chance for all people, over the world, to obtain the knowledge easily and limitless. Thus, the
... Show MoreThe present search aims to develop a test for selective attention, cognitive load and thinking mistakes and measuring these concepts among Baghdad university students. To make a comparison between the selective attention, cognitive load, and the mistakes of thinking among students in term of gender. To identify the relationship among the selective attention, cognitive load and the mistakes of thinking of university students. To achieve these purposes, the searcher has developed a test for selective attention, cognitive load, and the mistakes of thinking. Then, these tools were applied to a sample of (200) university students were selected from (21) college. The researcher used t-test of one sample, t-test of two independent
... Show Morethe history of the Scouting movement reflects the global social cultural and technological change over more than a century. scouting aims to develop young people worldwide through educational programs based on specific principles and values. in arab countries, the scouting movement is considered one of the most important platforms contributing to developing young people and enhancing their rule. positive in society, began with the establishment of the first Scout camp in the region and witnessed great growth and prosperity over the decades the research reveals the historical roots and development of the scout movement in the leading arab countries and analyzes the positive impact of scout movement in the leading arab countries on the develo
... Show MoreThe problem of the research lies in the bad timing of jump shot and layup due to lack of experience. The subjects were (5) youth basketball players under eighteen of the season 2015 – 2016. The results showed that agility didn't reinforce some fundamental offensive skills ending in jump shot and layup. The researcher recommended stressing offensive fundamental skills ending jump shot and layup without connecting it with agility. The training experience of most players participating in basketball league is very little thus more time should be offered to them before getting them into the league.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIn the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show More