The rise in the general level of prices in Iraq makes the local commodity less able to compete with other commodities, which leads to an increase in the amount of imports and a decrease in the amount of exports, since it raises demand for foreign currencies while decreasing demand for the local currency, which leads to a decrease in the exchange rate of the local currency in exchange for an increase in the exchange rate of currencies. This is one of the most important factors affecting the determination of the exchange rate and its fluctuations. This research deals with the currency of the European Euro and its impact against the Iraqi dinar. To make an accurate prediction for any process, modern methods can be used through which the model is developed. One of the most important modern methods that smooth the time series and purify it from noise is the wavelet transformation and in order to predict time series data using a new technique that combines the classic ARIMA method and the technique of Wavelet transformation, and this is called Wavelet-ARIMA hybrid model, as it was applied to data for a weekly time series of the rate of change in prices, buying and selling the European euro currency against the Iraqi dinar on the classic ARIMA model and the hybrid Wavelet-ARIMA model. The comparison was made between ARIMA and Wavelet-ARIMA models using several functions, including Haar, Db4 and Db6 to forecast the model that achieves better results for 64 weeks. As the hybrid model with Db6 function achieves better results, as the euro currency continues to increase, this negatively affects the Iraqi citizen in terms of high prices and positively on the country's economy
This work is divided into two parts first part study electronic structure and vibration properties of the Iobenguane material that is used in CT scan imaging. Iobenguane, or MIBG, is an aralkylguanidine analog of the adrenergic neurotransmitter norepinephrine and a radiopharmaceutical. It acts as a blocking agent for adrenergic neurons. When radiolabeled, it can be used in nuclear medicinal diagnostic techniques as well as in neuroendocrine antineoplastic treatments. The aim of this work is to provide general information about Iobenguane that can be used to obtain results to diagnose the diseases. The second part study image processing techniques, the CT scan image is transformed to frequency domain using the LWT. Two methods of contrast
... Show MoreBackground/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show MoreThe taxonomy of Ficus L., 1753 species is confusing because of the intense morphological variability and the ambiguity of the taxa. This study handled 36 macro-morphological characteristics to clarify the taxonomic identity of the taxa. The study revealed that Ficus is represented in the Egyptian gardens with forty-one taxa; 33 species, 4 subspecies and 4 varieties, and classified into five subgenera: Ficus Corner, 1960; Terega Raf., 1838; Sycomorus Raf., 1838; Synoecia (Miq.) Miq., 1867, and Spherosuke Raf.,1838; out of them seven were misidentified. Amongst, four new Ficus taxa were recently introduced to Egypt namely: F. lingua subsp. lingua Warb. ex De Wild. & T. Durand, 1901; F. pumila L., 1753; F. rumphii Blume, 1825, and F. su
... Show MoreThe development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.
There is poverty because of the difference in capacity and material resources, Previously poverty known on the basis of disparity between income and inadequate income. It realize later that fare wore effects of poverty is the erosion of human capital. The human poverty is the loss of food, education, health care and shelter.
In order to provide a database that target the poor , it have been propped a document on the features of poverty and the whereabouts of the poor and the rate of disparity between provinces.
Here the goal of the research is the identify the factors affecti
... Show MoreThis study examines the transformation of political slogans, clichés, and stereotypes in Russia and Iraq during periods of political regime change in the late 20th and early 21st centuries. The main objective of the work is to identify and comparatively analyze the linguistic and cultural changes that accompanied political transformations in both countries. The research is based on theoretical concepts of political myth, framing, and critical discourse analysis. The research methodology includes content analysis of political texts, comparative analysis of linguistic transformations, and analysis of statistical data on cultural consumption. The main hypothesis is that, despite the presence of common trends in linguistic and cultural
... Show MoreConversation analysis has long been the concern of many linguists who work in the field of discourse analysis. In spite of the fact that there are many researches have been done in the field of short stories but up to the researcher knowledge the investigation of the selected short stories has not been studied yet. Hence, this paper aims at answering the following questions: what are the features of children’s short stories language and the differences between short stories of four years old and those of six years old. Hence, the devices used by the story tellers in reciting the short stories should be observed. Thus, the researcher has consulted the models presented by Johnson and Fillmore (2010) to show tenses and sentence str
... Show MoreA novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo
... Show MoreBig data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreCloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show More