Preferred Language
Articles
/
jeasiq-1307
A comparative study of the role of monetary policies in achieving economic growth in some oil and non-oil countries during the period 1990-2017
...Show More Authors

The research problem was to identify the impact of monetary policies on economic growth in the oil and non-oil countries. The researcher chose the Republic of Iraq as an example for the oil countries and the Arab Republic of Egypt as an example for the non-oil countries to hold a comparison on the impact of monetary policies.

The research found that the monetary policies and their tools in the Iraqi economy affect the rate of GDP growth by 73%, which shows the strong impact of monetary policies on the economic growth in the Iraqi economy as an example of an oil state. GDP growth rate of 61%, indicating the impact of monetary policies on economic growth in the Egyptian economy as an example of a non-oil state

 And that the impact of Iraqi monetary policies and tools is greater than the impact of the Egyptian monetary policies and tools during the period of study from 1990 to 2017. This may be due to the basic dependence of Iraq on oil in increasing the amount of money traded and the continuous rise in oil prices during that period, which is not available in the Egyptian economy Shows how different the impact of monetary policy on economic growth rates between oil and non-oil countries.

The study recommended the use of monetary policies with a high impact on economic growth, increasing the effectiveness of the monetary policy tools used, as well as the need to work on increasing and diversifying sources of income and financing and not relying on one source of income in both Iraq and Egypt.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Intellectual and Aesthetic Relationship between the Public and the Modern Theater (the play Oh Lord!) as a model: فيصل عبد عودة
...Show More Authors

The issue of the public in the directions and theories of the theater director in the world theater, especially after the emergence of realism and the crystallization of the term direction and the definition of the role of the director in 1850 AD by the Duke Max Mengen took different paths to the Greek, Roman and even Elizabethan audience because it was here subjected to the theatrical equation from  its production and presentation due to the fact that the  theatrical performance is a technical artistic production, and the audience participation, watching and consumption, and here the participation of the audience was subjected to three directions:  the enlightenment in the sense of arousing sense, the incitement in the se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Empirical Study for Capturing and Allocating Significant Risk Factors in School Construction Projects in Iraq
...Show More Authors

In Iraq, more than 1031 school projects have been halted due to disputes and claims resulting from financial, contractual, or other issues. This research aims to identify, prioritize, and allocate the most critical risk factors that threaten these projects’ success for the duration (2017-2022). Based on a multi-step methodology developed through systematic literature reviews, realistic case studies, and semi-structured interviews, 47 risk factors were identified. Based on 153 verified responses, the survey reveals that the top-ranked risk factors are corruption and bribery, delaying the payments of the financial dues to the contractors or sub-contractors, absence of risk management strategy, multiple change orders due

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Farmacia
LASMIDITAN NANOEMULSION BASED IN SITU GEL INTRANASAL DOSAGE FORM: FORMULATION, CHARACTERIZATION AND IN VIVO STUDY
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study of Drug Delivery system for Prednisolone Loaded and Released by Mesoporous Silica MCM-41
...Show More Authors

In the present study, nanoporous material type MCM-41 was prepared by the sol-gel technique and was used as a carrier for prednisolone (PRD) drug delivery. The structural properties of mesoporous were fully characterized by X-ray diffraction (XRD), N2 adsorption /desorption and Fourier-transform infrared (FTIR). The mass transfer in term of adsorption process (loading) and desorption process (releasing) properties were investigated. The maximum drug loading efficiency was equal to 38% and 47.5% at different concentrations. The PRD released was prudently studied in water media of pH 6.8 simulated body fluid (SBF) in according to "United State Pharmacopeia (USP38)". The results proved that the release of prednisolone from MCM-41

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Sat Apr 06 2019
Journal Name
International Journal Of English Linguistics
A Morpho- Syntactic study of Contemporary Science Fiction Short Stories
...Show More Authors

The aim of the present study is to research two morphological processes: acronym and compounding (phrasal compounds/ circumlocution) and one syntactic category which are 'existential sentences' in science fiction short stories. The present paper identifies different types and rates of existential sentences. In this respect , 'bare existential and locative’ read the high percentages and may be contrasted with other classifications of English existential sentences which have a verb other than 'be' and a definite expression. 'Phrasal compounds' vary in rates as they constitute notable percentage for those that involve 'lexical means and lexical relations' followed by 'prepositional compounds' , 'conjunctional compounds' , and those invo

... Show More
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Cleaner Production
A study of biogas production from date palm fruit wastes
...Show More Authors

View Publication
Scopus (41)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Iraqi Journal Of Physics
Design an Efficient Neural Network to Determine the Rate of Contamination in the Tigris River in Baghdad City
...Show More Authors

This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t

... Show More
View Publication
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Homomorphism of Cubic bipolar ideals of a KU-semigroup
...Show More Authors

The idea of a homomorphism of a cubic set of a KU-semigroup is studied and the concept of the product between two cubic sets is defined. And then, a new cubic bipolar fuzzy set in this structure is discussed, and some important results are achieved. Also, the product of cubic subsets is discussed and some theorems are proved.