The research problem was to identify the impact of monetary policies on economic growth in the oil and non-oil countries. The researcher chose the Republic of Iraq as an example for the oil countries and the Arab Republic of Egypt as an example for the non-oil countries to hold a comparison on the impact of monetary policies.
The research found that the monetary policies and their tools in the Iraqi economy affect the rate of GDP growth by 73%, which shows the strong impact of monetary policies on the economic growth in the Iraqi economy as an example of an oil state. GDP growth rate of 61%, indicating the impact of monetary policies on economic growth in the
Abstract This study aims to compare British war poetry of the First World War with Iraqi poetry from the mid-20th century with special reference to Iraqi war poetry of the 1980’s Iraq-Iran War and the period that followed it. It will also investigate the influence of the designated British war poetry on the chosen body of Iraqi poetry. Through the comparison of sample poems the study presents, firstly, the direct influence of the British poetry of the Great War and its translation which formed the seeds of a more radical movement in Iraqi poetry during the 1980’s Iran/Iraq War and the period that followed it. The study also presents a comparison of the works of British and Iraqi civilian poets during and after the war time and their con
... Show MoreObjectives: This study aimed to evaluate and compare the effect of plasma treatment versus conventional treatment on the micro shear bond strength (μSBS), surface roughness, and wettability of three different CAD/CAM materials. Materials and methods: Sixty cylindrical specimens (5 mm diameter ×3 mm height) were prepared from three different CAD/CAM materials: Group A: Zirconia, Group B: Lithium disilicate, and Group C: Resin nano-ceramic. Each group was subdivided into two subgroups according to surface treatment used: Subgroup I: Conventional treatment, zirconia was sandblasted with Al2O3, while lithium disilicate and resin nano-ceramic were etched with hydrofluoric acid. Subgroup II: Plasma treatment, the surface of each material was tr
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More