The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application. It is well known that the term "static" refers to models that do not explicitly take time into account. This model does not show capital accumulation over time. The term "open" refers to the existence of a number of variables (mainly the components of the final request) that are determined outside the model (M 2, p. 47/48). The aim of this research is to focus on the most important uses of the user / product model in building the national economy plan, and we do not want here to lengthen how to build the model and what its problems and advantages
The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show Morethe bank sect for any country is very important because its represent a major nerve to feed a verity economic and finance activities .development any state measure by development banking sets and its represent important factor to investors attract . and because important of this subject ,teen accounting rule is a specialized for it .its related by Disclosures in the Financial Statements Of Banks and The Similar Institutions, its accredit by auditing and accounting standard consul in republic of Iraq.in date 10/28/1998. &
... Show MorePoverty is defined as a low standard of living in the sense that a poor person can not afford a minimum standard of living. The phenomenon of poverty is one of the most serious problems that must be dealt with seriously. This phenomenon has persisted in Iraq for decades because of the harsh economic conditions and unstable security conditions due to the crises it has faced since 2013. This study requires much study and analysis. And rural areas as a special case. In this study, the researcher examined the poverty line as a criterion in estimating the poverty indicators, which include (poverty percentage H, poverty gap PG, poverty intensity PS), based on the continuous social and economic survey data for households in 2014. The ma
... Show MoreAbstract:-
The approach maintenance and replacement one of techniques of operations research whom cares of the failure experienced by a lot of production lines which consist of a set of machines and equipment, which in turn exposed to the failure or work stoppages over the lifetime, which requires reducing the working time of these machines or equipment below what can or conuct maintenance process once in a while or a replacement for one part of the machine or replace one of the machines in production lines. In this research is the study of the failure s that occur in some parts of one of the machines for the General Company for Vege
... Show MoreIn our research, we seek to shed a light on one of the most important and sensitive issues, namely, the Sufi influence in the Iraqi novel through the lame maqam of the novelist Jumaa Al-Lami, the Sufi discourse contains many semantic paradoxes between the text's apparent pronunciation and its interpretation of the format and the context that produced these patterns, and incited them, which concludes different results from the prevailing provisions and fixed ideas from the narrative text.The Arabic and Iraqi novel in particular became inspired by the power of Sufi discourse by talking about several Sufi figures by referring to it openly, or implicitly inspired by unauthorized concealment, in employing some of the ideas, or summoning
... Show MoreThis study aims at examining the effectiveness of using the narrative approach in teaching the Interpretation of the Qur'an course in the development of conceptual comprehension among first-grade middle school female students. To achieve the objective of this study, a quantitative quasi-experimental design has been used. The sample consisted of first-grade middle school female students at "the third middle school" in Buraidah city, as this school suits the objective of the study. A test of conceptual understanding has been built by the researchers according to a list of conceptual understating skills at a significance level of α ≤ 0.05. Results have shown that there are statistically significant differences at the level (α ≤ 0,05)
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreIn this research the Empirical Bayes method is used to Estimate the affiliation parameter in the clinical trials and then we compare this with the Moment Estimates for this parameter using Monte Carlo stimulation , we assumed that the distribution of the observation is binomial distribution while the distribution with the unknown random parameters is beta distribution ,finally we conclude that the Empirical bayes method for the random affiliation parameter is efficient using Mean Squares Error (MSE) and for different Sample size .