Preferred Language
Articles
/
jpd-205
Using the Input - Output Model in building the economic plan using the computer
...Show More Authors

The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application. It is well known that the term "static" refers to models that do not explicitly take time into account. This model does not show capital accumulation over time. The term "open" refers to the existence of a number of variables (mainly the components of the final request) that are determined outside the model (M 2, p. 47/48). The aim of this research is to focus on the most important uses of the user / product model in building the national economy plan, and we do not want here to lengthen how to build the model and what its problems and advantages

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The effect of teaching using the six thinking hats on academic achievement for students in the second grade average in the subject of family education
...Show More Authors

Research problem:
Problem of current research can determine the dimensions to answer the following question: The effect of teaching using the six thinking hats on academic achievement for students in the second grade average in the subject of Family Education. The importance of research: research is gaining importance in terms of:
1. That this research is the first of its kind in the researcher's knowledge _ which deals with the teaching of Family Education by using the six hats, the researcher hopes to fill a gap in the educational field and serve in other studies serve the materials home economics. 2. Keep pace with the new field of modern education and strategies. 3. Highlight on the educational strategy in the field of creative

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Using Factor Analysis In Determine the Important Influenced Factors In Student Outcomes Pheonema From Primary School In The Province Of Baghdad
...Show More Authors

Abstract

The Purpose of This Research is The  Main Factors  In out Comes Phenomena From Primary School Which in Creased in Lost Period in Iraq And to Find Solutions to The This Problem.

In Order to Achieve Al The Aim The Research Choose a Systematic Random Sample of School Records For Students in Some Primary Schools in Karkh and Rusafa and Year of Study (2010-2015) and Size (40) Samples, included  (16) Variable , Collected in Form Prepared by The Research As a Way to Analyze The Data.

Remember to Summarize The (6) Main components Pay a Student to Drop out of Primary Schools in The Province of Baghdad are Arranged As Follows:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role & Mechanism of Market Makers in Iraqi Stock Market: "Proposal Frame"
...Show More Authors

This researchable paper aims to focus of the role & mechanism of market makers in Iraqi stock market through analyzing its role in other Arabian as well as global stock ones, especially in current period through activate the use of bonds, shares, and trying to create a continued price balance. Then decreasing the opportunity having gaps between highest and lowest level without reasonable causes. In addition trying to deactivate the common decision without supported information. Moreover, this paper aims to explain the rules of increasing liquidity and having balance to lead the market into positive direction.  Thus, for achieving the above-mentioned requirements, such conditions should be underlined by market makers as well as t

... Show More
View Publication
Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Study of Mass Transfer Coefficient in Slurry Bubble Column Reactor Using Neural Network
...Show More Authors

 

The objective of this study was to develop neural network algorithm, (Multilayer Perceptron), based correlations for the prediction overall volumetric mass-transfer coefficient (kLa), in slurry bubble column for gas-liquid-solid systems. The Multilayer Perceptron is a novel technique based on the feature generation approach using back propagation neural network. Measurements of overall volumetric mass transfer coefficient were made with the air - Water, air - Glycerin and air - Alcohol systems as the liquid phase in bubble column of 0.15 m diameter. For operation with gas velocity in the range 0-20 cm/sec, the overall volumetric mass transfer coefficient was found to decrease w

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Accounting measurement of strategic storage in light of government support and its implications for presentation and disclosure / proposed model: an analytical study at the General Company for Grain Trade
...Show More Authors

يؤدي عرض معلومات مضللة او محرفة ضمن القوائم المالية والتي تعد أهم مصادر المعلومات الموثوقة التي يُعول عليها لاتخاذ القرارات السليمة الى عدم قدرتها على عكس نتيجة النشاط والمركز المالي لها او اعمال الوحدة الاقتصادية لتلك الفترات الزمنية بصورة صادقة وعادلة نتيجة لنوعية المعلومات المفصح عنها في القوائم المالية لذلك زاد الاهتمام بتطوير الممارسات المحاسبية لتتضمن افصاحات كافية بغرض اعطائهم صورة صادقة وعادلة

... Show More
View Publication Preview PDF
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
Study of Change in Regional Land Use Using Remote Sensing Technology and Geographic Information Systems / Study Area (Hawr Al Huweiza) for the Years 1973-1990-2004
...Show More Authors

 

his project try to explain the using ability of spatial techniques for land cover change detection on regional level with the time parameter and did select for explain these abilities study case (Hewaizah marsh ) . this area apply to many big changes with the time. These changes made action on characters and behaviors of this area as well as all activities in it . This Project concerting to recognize the Using importance of remote sensing and GIS Methodology in data collecting for the changes of land use and the methodology for the analyses and getting the results for the next using as a base data for development and drawing the plans as well as in regional planning .This project focus on practical

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref