The rise in the general level of prices in Iraq makes the local commodity less able to compete with other commodities, which leads to an increase in the amount of imports and a decrease in the amount of exports, since it raises demand for foreign currencies while decreasing demand for the local currency, which leads to a decrease in the exchange rate of the local currency in exchange for an increase in the exchange rate of currencies. This is one of the most important factors affecting the determination of the exchange rate and its fluctuations. This research deals with the currency of the European Euro and its impact against the Iraqi dinar. To make an accurate prediction for any process, modern methods can be used through which the model is developed. One of the most important modern methods that smooth the time series and purify it from noise is the wavelet transformation and in order to predict time series data using a new technique that combines the classic ARIMA method and the technique of Wavelet transformation, and this is called Wavelet-ARIMA hybrid model, as it was applied to data for a weekly time series of the rate of change in prices, buying and selling the European euro currency against the Iraqi dinar on the classic ARIMA model and the hybrid Wavelet-ARIMA model. The comparison was made between ARIMA and Wavelet-ARIMA models using several functions, including Haar, Db4 and Db6 to forecast the model that achieves better results for 64 weeks. As the hybrid model with Db6 function achieves better results, as the euro currency continues to increase, this negatively affects the Iraqi citizen in terms of high prices and positively on the country's economy
The absence of ecological perception in the local urbanization resulted in the lack of a clear conception of achieving sustainability in its simplest form in the urban reality and in the city of Baghdad in particular. The research assumes the possibility of achieving urban sustainability in Iraqi cities by applying the cities for the most effective methods to implemented ecological solutions and introducing appropriate urban planning tools and improve the living environment. The research focuses on the ability to define some aspects to achieve a sustainable local urban identity from global experiences. This was performed by proposing a scheduled theoretical framework, through which th
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThis study came to discuss the subject of industries dependent on petrochemical industries in Iraq (plastic as a model) during the period 2005–2020, and the study concluded that the plastic industries contribute to areas of advancement and progress and opportunities to deal efficiently with the challenges posed by the new variables, the most important of which is the information revolution. communications and trade liberalization, and this is what contributes to the competitiveness of these industries. And because the petrochemical industry in Iraq has an active role in establishing plastic industrial clusters and clusters of micro, small, and medium industries by providing the necessary feedstock for these industries in various fields
... Show MoreIn this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Moreهذه الورقة البحثية تهدف الى مناقشة سبل تطوير التعليم العالي في العالم العربي والارتقاء به لخلق راسمال بشري وثقافي قادر على مواجهة تحديات العصر، فالتنمية الاقتصادية في العصر الحالي ما عادت تعتمد على المواد الاولية بل على القيمة الابداعية للانسان التي اصبحت اساسية في المنافسة الحالية بين الشعوب الانسانية و اصبح الفكر المبدع هو المنافس الحقيقي المهم حيث تصنع احدث الاجهزة الحديثة باحجام صغيرة ومواد اولية اقل
... Show Moreيعد تحليل السلاسل الزمنية من المواضـيع الهامة في تفسير الظـواهر التي تحدث خلال فترة زمنية معينة. ان الهدف من هذا لتحليل هو الحصـول على وصف وبنـاء أنموذج مناسب من اجل اعطاء صورة مستقبلية واضحة للسلاسل الزمنية المدروسة وان السلاسل الزمنية اهم الادوات المستخدمة في بناء وتقدير والتنبؤ بالظواهر المختلفة وان الاستدامة المالية هي الحالة التي تكون فيها الدولة قادرة على الوفاء بالتزاماتها الحالية والمستقبلية من غي
... Show More