Preferred Language
Articles
/
jpd-205
Using the Input - Output Model in building the economic plan using the computer
...Show More Authors

The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application. It is well known that the term "static" refers to models that do not explicitly take time into account. This model does not show capital accumulation over time. The term "open" refers to the existence of a number of variables (mainly the components of the final request) that are determined outside the model (M 2, p. 47/48). The aim of this research is to focus on the most important uses of the user / product model in building the national economy plan, and we do not want here to lengthen how to build the model and what its problems and advantages

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Determination of the lot size using the Wagner-Whitin algorithm under the Constraint Theory / Case Study of Diyala Public Company
...Show More Authors

         International companies are striving to reduce their costs and increase their profits, and these trends have produced many methods and techniques to achieve these goals. these methods is heuristic and the other Optimization.. The research includes an attempt to adapt some of these techniques in the Iraqi companies, and these techniques are to determine the optimal lot size using the algorithms Wagner-Whitin under the theory of constraints. The research adopted the case study methodology to objectively identify the problem of research, namely determining lot size optimal for each of the products of electronic measurement laboratory in Diyala and in light of the bottlenecks in w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of Barman model in acquiring the historical concepts among fourth-grade literary students
...Show More Authors

The researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data.    &

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of Barman model in acquiring the historical concepts among fourth-grade literary students
...Show More Authors

The researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data.    &

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
مجلة بحوث
The role of university in promoting the culture of volunteering among students (Mustansiriya University Model)
...Show More Authors

Abstract The aim of this study is to identify the role played by the university in reinforcing the culture of voluntary work in college students and sequencing these roles according to their priority. To achieve this aim, the researcher used the descriptive approach. After being informed of the literature background and of the previous studies related to the core aim of this recent study, the researcher has built up a questionnaire of (20) items investigating the role of university in reinforcing the culture of voluntary work in the college students. The standardized features of the questionnaire have been checked for the purpose of the questionnaire validity (virtual and constructive validity) and stability (reconstruction and Cronbach's A

... Show More
View Publication
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Monetary policy constraints and economic reform programsThe reality of the Iraqi economy
...Show More Authors

أن السياسة النقدية في العراق لم تشهد تحسناً كبيراً في دورها المطلوب
منها، وهذا يعود الى جملة من التغيرات على أدائها ودورها في التأثير على المتغيرات الأقتصادية المهمة، اذ حصلت ظروف صعبة على المستوى السياسي والأقتصادي اسهمت في أضعاف دورها في العراق. فالحروب العسكرية الثلاثة في وقت قياسي دمرت البنى التحتية للأقتصاد العراقي، وأخرت عملية التنمية الأقتصادية والبشرية لعدة عقود بسبب الأستنزاف الكبير للمو

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Temperature and Residual Stress Distribution in CO2 Laser Welded Aluminum 6061 Plates Using FEM
...Show More Authors

This paper develops a nonlinear transient three-dimensional heat transfer finite element model and a rate independent three-dimensional deformation model, developed for the CO2 laser welding simulations in Al-6061-T6 alloy. Simulations are performed using an indirect coupled thermal-structural method for the process of welding. Temperature-dependent thermal properties of Al-6061-T6, effect of latent heat of fusion, and the convective and radiative boundary conditions are included in the model. The heat input to the model is assumed to be a Gaussian heat source. The finite element code ANSYS12, along with a few FORTRAN subroutines, are employed to obtain the numerical results. The benefit of the proposed methodology is that it

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref