Interested in this research shed light on the reality of foreign trade to Iraq Who suffers from a marked deterioration due to poor economic diversification of the country And increase the degree of economic exposure , Which creates a state of extreme caution towards the question of accession to the (WTO) , As controls Iraq's foreign trade commodity , a president of one oil As well as the contribution of this item , and by a large formation in GDP , And that such a large and dangerous decline in the degree of economic diversification will create negative effects On overall economic activity components , As the scarcity of commodity products will inevitably lead To weakness in the domestic market's ability to meet the domestic demand , Which will open the door to imports of goods to invade this market , Supported in financing the movement of such imports Are being provided by oil exports of financial revenues As a result of that process will be generated negative impact on the trade balance of the country And the value of local currency As well as direct effects on cash reserves of hard currency held by Country , These structural imbalances in Iraq's foreign trade requires On the Iraqi economy and the current wait own reality on the subject of accession to the World Organization , Because joining lead to damage in the economic activity in the physical potential Because of the lack of a local product , whether industrial or agricultural competitor for foreign products , Which will lead to a lack of hope in the revival of the domestic industry and the advancement of the agricultural sector , The potential industrial and agricultural sector is not commensurate with their counterparts in the economies of the countries Members of the acceding which will not qualify for entry in the successful competition with the products of these countries , And also lead to join the organization continued exposure economy with a high degree on the outside and a lot of other negatives and the damage that will cause the Iraqi economy .
Derivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with app
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreThe concepts of higher Bi- homomorphism and Jordan higher Bi- homomorphism have been introduced and studied the relation between Jordan and ordinary higher Bi- homomorphism also the concepts of Co- higher Bi- homomorphism and Co- Jordan higher Bi- homomorphism introduced and the relation between them in Banach algebra have also been studied.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreIn the theoretical part, removal of direct yellow 8 (DY8) from water solution was accomplished using Bentonite Clay as an adsorbent. Under batch adsorption, the adsorption was observed as a function of contact time, adsorbent dosage, pH, and temperature. The equilibrium data were fitted with the Langmuir and Freundlich adsorption models, and the linear regression coefficient R2 was used to determine the best fitting isotherm model. thermodynamic parameters of the ongoing adsorption mechanism, such as Gibb's free energy, enthalpy, and entropy, have also been measured. The batch method was also used for the kinetic calculations, and the day's adsorption assumes first-order rate kinetics. The kinetic studies also show that the intrapar
... Show MoreBackground: Asthma is a disease of the airways characterized by chronic inflammation associated with airway hyper-responsiveness and airway wall remodeling. Aims of the study: The aims of this study was to determine the prevalence of oral manifestations , identify different microorganism from oral micro flora and determination of salivary IgA and salivary flow rate in asthmatic patients taking different dose of Prednisolone in comparison with control group. Subjects, materials and methods: The study included 17 patients under treatment with Prednisolone (10-20 mg),15 patients take (20-30 mg) of Prednisolone and other 18 patients take (30 – 40mg) of Prednisolone, and 25 healthy control group (10 male and 15 female). Results : The mo
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show More