In this research, we sought to identify the nature of the relationship between the exchange rate of the Chinese yuan and the value of Chinese exports, through the formulation of a standard model based on the model of common integration, and based on the data of the study and using the test "Angel-Granger" It reflects the relationship between the two research variables, through which the relationship between the RMB exchange rate and the value of Chinese exports was estimated during the period 1978-2017.
In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreLung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-c
... Show MoreHepatitis B is an inflammation of the liver that caused by Hepatitis B virus (HBV) which is DNA virus that infects the human and some kinds of animals such as chimpanzees and birds. This disease considered as the major disease of mankind and a serious global public health problem. HBsAg, HBeAg, HBcAb, HBeAb and HBsAb are markers used to detect the presence and the stage of infection. The current study included (181) individuals from both sexes, (137) males and (44) females. By ratio 3.11: 1.The mean age of patients 2.4033 ± 0.83519 (range 18-73) years as follows < 20 (11.6%), 21–40 (47.5%), 41–60 (29.8%) and > 60 (11.0%) . These patients are 73 (40.4%) Blood donors from Central Blood Bank, 88 (48.6%) Chronic kidney failure at Ibn –
... Show MoreRecently, Malaysia has been recognized as one of the most popular destinations for Foreign Direct Investment (FDI) in Southeast Asia. But how do these FDI inflows affect Malaysia economy? This paper aims to identify the role of FDI inflows in Malaysia economic growth through a proposed endogenous growth model. Annual data covers from 1975 to 2010. Unit root test and Johansen Co-integration test are adopted to respectively verify the time series data is stable and the linear combination of the variables is stationary. Hierarchical Multiple Regressions (HMR) Analysis is then conducted to find out the momentum of the Malaysia economic growth including FDI inflows. The results show that the FDI inflows together with the human capital deve
... Show MoreSelf is the main factor of personality and the acceptance of others where each of them are connecting and plays an important role in emotional maturation. The researches affirmed that the leading behavior depending on good human relations between the employers and the employees will enhance their goals and the goals of the institution at the same time . This study aims to measure the emotional maturation among the leactures of the university according to sex variable and identify the correlation between emotional maturation and the level of leading behavior among the lecturers of the university. The sample consists of two samples where the lst is to build the measwe consisting of (200)males and famales lecturers and the 2nd which is the
... Show MoreResearch Summary
Praise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of the prophets and messengers, our master Muhammad, and on the good God and his righteous companions.
For the most truthful hadith is the Book of God Almighty, and the best guidance is the guidance of the Prophet, may God bless him and grant him peace. If any)). Our good predecessor took care of collecting what they were able to collect and arrange from the words of the prophecy issued by our master Muhammad, peace and blessings be upon him, and wrote works on them including forms of support, parts, dictionaries, and mosques. About me, if any, in order to re