Preferred Language
Articles
/
jeasiq-1430
تقدير مصفوفة الحسابات القومية وتحديثها بإستخدام طريقة (C.E) دراسة مقارنة بين الطرق المستخدمة
...Show More Authors

ليس جديداً القول بان هناك حاجة مستمرة ومتزايدة لاستخدام البيانات الاقتصادية المتسقة عن القطاعات المختلفة في الاقتصاد القومي لدعم وإسناد عملية التحليل الاقتصادي وتطوير النماذج الاقتصادية الكلية.

وتعرض مصفوفة الحسابات القومية Social Accounting Matrix  (SAM) اطاراً شاملاً من المعلومات الأساسية لهذا النوع من النماذج والتحليل. فهي تتضمن كلا من المستخدم- المنتج
(جداول المدخلات- المخرجات) وحسابات الناتج والدخل القومي في اطار متناسق.

وبينما يتم اعداد جداول المستخدم – المنتج عادة مرة واحدة كل خمس سنوات او شيء من هذا القبيل، فان حسابات الناتج والدخل القومي تعد سنوياً وبتباطؤ زمني، أي لفترة زمنية سابقة. اما تحديث مصفوفة حسابات قومية لفترة لاحقة، فأنها لا تعد مسالة صعبة فحسب، وإنما تعد  مسالة تحدي.

ولتركيب مصفوفة حسابات قومية موسعة قابلة للتحليل الاقتصادي, فان البيانات المطلوبة هي من السعة بحيث يصعب توفيرها، وعند ذلك ينبغي ان تستكمل بواسطة معلومات اضافية ومن مصادر مختلفة، مثل الاحصاءات الصناعية، مسوحات العمل، البيانات الزراعية، الحسابات الحكومية، حسابات التجارة الخارجية، ومسوحات الاسر وغيرها. اما المشكلة الرئيسية في تحديث مصفوفة الحسابات القومية فانها تكمن في أيجاد طريقة كفوءة وقليلة الكلفة لدمج المعلومات المستحصلة من تلك المصادر والتوفيق بينها، بضمنها البيانات المستقاة من سنين سابقة.

ان الطريقة التقليدية لبناء مصفوفة حسابات قومية حديثة متماسكة ومتسقة، هي البدء من مصفوفة حسابات لسنة اساس معينة سابقة، ثم تحديثها لفترة لاحقة من خلال ادخال معلومات جديدة عن مجاميع الصفوف والاعمدة، لتلك المصفوفة مع بقاء المعلومات حول التدفقات الداخلية التي تتضمنها الـ ( SAM) ثابتة، وغالبا ما يتم البدء من مصفوفة حسابات غير متسقة ومعلومات غير متكاملة عن مجاميع الصفوف والاعمدة والتدفقات المختلفة في الـ (SAM).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy logic in the estimate of reliability function for k - components systems
...Show More Authors

Abstract:

One of the important things provided by fuzzy model is to identify the membership functions. In the fuzzy reliability applications with failure functions of the kind who cares that deals with positive variables .There are many types of membership functions studied by many researchers, including triangular membership function, trapezoidal membership function and bell-shaped membership function. In I research we used beta function. Based on this paper study classical method to obtain estimation fuzzy reliability function for both series and parallel systems.

View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Estimate missing value by use analyses of covariance method for split block-design
...Show More Authors

The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Use the le'vy Model on stock returns for some Iraqi banks estimate
...Show More Authors

 

In this article we  study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those  estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.

which showed the results to a preference MLE on MME based on the standard of comparison the average square e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 04 2014
Journal Name
مجلة كلية مدينة العلم الجامعة
تقدير دالة المعولية بالطرائق اللامعلمية في حالة البيانات المراقبة "المتجمعة"
...Show More Authors

Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Estimation Multivariate data points in spatial statistics with application
...Show More Authors

This paper  deals  to how to estimate points non measured spatial data when the number of its terms (sample spatial) a few, that are not preferred for the estimation process, because we also know that whenever if the data is large, the estimation results of the points non measured to be better and thus the variance estimate less, so the idea of this paper is how to take advantage of the data other secondary (auxiliary), which have a strong correlation with the primary data (basic) to be estimated single points of non-measured, as well as measuring the variance estimate, has been the use of technique Co-kriging in this field to build predictions spatial estimation process, and then we applied this idea to real data in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 10 2016
Journal Name
ألمؤتمر الدولي العلمي الخامس للاحصائيين العرب/ القاهرة
Proposition of Modified Genetic Algorithm to Estimate Additive Model by using Simulation
...Show More Authors

Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo

... Show More
Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Digital-Based Optimal AVR Design of Synchronous Generator Exciter Using LQR Technique
...Show More Authors

In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q,  this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref