Preferred Language
Articles
/
jeasiq-369
Measuring the level of unemployment in Iraq by using the user / product schedule for 2010
...Show More Authors

Economic performance is one of the most important indicators of economic activity and with the performance of the economy progress varied sources of output and increase economic growth rates and per capita national income, and to recover the business environment and increase investment rates and rising effectiveness of the financial and monetary institutions and credit market. Which leads to increased employment rates and reducing unemployment rates and the elimination of many of the social problems and improve the average per capita income as well as improve the level of national income.

The input / output tables is a technique mathematical indicates economic performance and which shows the extent of contribution and interaction and mutual harmony between national sectors of the economy, it is through inference parameters  economic sectors can come to know the strength of forward linkages and the background to those sectors.

Which enhances the ability of each economic sector in the provision of production inputs to other sectors on the one hand, and how the sector can use the output of other sectors in economic activity fed by the other hand.

The problem of unemployment linked to output via the labor market, and the provision of economic resources, expertise and skills acquired labor force in the production process.

This study was based on the user / product tables to get to the actual level of unemployment in the economy in terms of GNP. Which helps the decision maker to recognize that the real amount of unemployment and make the necessary treatments to eliminate that level of unemployment through activation of the role output across sectors.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Time Series Forecasting by Using Box-Jenkins Models
...Show More Authors

    In this paper we introduce a brief review about Box-Jenkins models. The acronym ARIMA stands for “autoregressive integrated moving average”. It is a good method to forecast for stationary and non stationary time series. According to the data which obtained from Baghdad Water Authority, we are modelling two series, the first one about pure water consumption and the second about the number of participants. Then we determine an optimal model by depending on choosing minimum MSE as criterion.

View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
TECHNIQES OF SURREALISM: A STUDY IN TWO NOVELS BY THOMAS PYNCHON, V. AND THE CRYING OF LOT 49
...Show More Authors

Surrealism is a twentieth-century literary and artistic movement oriented toward the liberation of the mind. Surrealism is a reaction to the philosophy of rationalism which was believed to be the cause of the disaster of World War I. It emphasizes the expression of the imagination as revealed in dreams and presented without conscious control, the unexpected juxtapositions of objects, the withdrawal of the self, and the exploitation of chance effects.
Surrealism began in Paris in the early 1920s, as Europe emerged from the devastation of World War I. A group of writers, artists, and filmmakers, led by the poet André Breton, adopted the word surréaliste (meaning, roughly, "super-real") as a label for their artistic activities. Influen

... Show More
View Publication Preview PDF
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Maximum Complete (k,n)-Arcs in the Projective Plane PG(2,4) By Geometric Method
...Show More Authors

A (k,n)-arc A in a finite projective plane PG(2,q) over Galois field GF(q), q=pⁿ for same prime number p and some integer n≥2, is a set of k points, no n+1 of which are collinear.  A (k,n)-arc is complete if it is not contained in a(k+1,n)-arc.  In this paper, the maximum complete (k,n)-arcs, n=2,3 in PG(2,4) can be constructed from the equation of the conic.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
The Iraqi Journal Of Agricultural Science 48 (5), 1197-1205‏
Sex identification of date palm by using dna molecular markers
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Prediction of consolidation due to dewatering by using MATLAB software
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref