909 research outputs found

    QUEST II. A multi country business cycle and growth model. Economic Papers No. 123, October 1997. II/509/97-EN

    Get PDF
    From the Introduction. QUEST was designed to analyse the economies in the member states of the European Union and their interactions with the rest of the world, especially with the United States and Japan. The focus of the model is on the transmission of the effects of economic policy both on the domestic and the international economy. The model was primarily constructed to serve as a tool for policy simulation; less emphasis was put on its ability to serve as a forecasting tool. Given the wide coverage of the model it must necessarily be highly aggregated. A high degree of aggregation and foundation of the specification in current macroeconomic theory also helps in interpreting and understanding the results of the simulations. Finally simplicity also facilitates the solution of the model and reduces the time and memory requirements of the computer-simulations. The new model contains structural models for the EU member states, the US and Japan and distinguishes 10 additional countries/regions in trade feedback models in order to model trade interactions with the rest of the world

    Fiscal policy in an estimated open-economy model for the Euro area

    Get PDF
    This paper uses an estimated DSGE model for the euro area to study the effects of fiscal stabilisation policies. There are at least two features of the euro area economy which makes this analysis interesting. First, there are nominal rigidities in goods and labour markets, and there are financial market frictions with a significant share of liquidity constrained households. Second, the government is a major sector of the euro area economy. In this paper we look at fiscal stabilisation via government consumption, investment, transfers and wage taxes. Empirical evidence is found for systematic countercyclical fiscal policy. Consistent with previous findings, there is a small positive fiscal multiplier in the case of transitory fiscal shocks. It is found that fiscal policy is effective in stabilising GDP in the presence of demand and supply shocks. Fiscal policy helps to reduce the demand externality arising from nominal rigidities. In addition automatic stabilisation via government transfers helps to smooth consumption of liquidity constrained household. Fiscal policy partly compensates the financial market distortion. With distorted goods, labour and financial markets it is found that the estimated fiscal policy rules reduce fluctuations in euro area GDP by about 14 percent.DSGE modelling, fiscal policy, stabilisation policies, euro area, Ratto, Roeger, in't Veld

    Consumption and models of the world economy

    Full text link

    Cyclical stabilisation under the Stability and Growth Pact: How effective are automatic stabilisers?

    Get PDF
    It is widely recognised that fiscal policy will have greater responsibilities for cyclical stabilisation in the EMU, given the loss of the monetary instrument at national level. At the same time, the EMU’s budgetary framework emphasises the need to rely on automatic fiscal stabilisers, rather than active policies, in cushioning the business cycle. We show that automatic stabilisers are relatively powerful in the event of a shock to private consumption, but less so as regards shocks to private investment and exports. In respect of supply side shocks, automatic stabilisers are largely ineffective, which may in fact be a good thing to the extent that supply-side disturbances call for structural adjustment rather than cyclical stabilisation. Looking ahead, one of the challenges facing policy-makers will be how to design tax and welfare reforms which, while improving incentives and market functioning, do not stifle – and in fact could strengthen – the impact of automatic stabilisers.cyclical stabilisation; automatic stabilisers; Stability and Growth Pact

    Preserving Steganography Information Over Image Transformations

    Get PDF
    Steganografi er kunsten å skjule informasjon i andre medium. Innen bildesteganografi blir skjulte meldinger gjemt i bilder som ser normale ut for det blotte øye, men som en mottaker kan hente ut den skjulte meldingen fra. Bildesteganografi har vært studert i mange år, og det finnes mange steganografimetoder å velge mellom. Normalt er premisset en studerer innen steganografi at bilder vil bli sendt mellom to parter uten noe videre modifikasjon under overføringen, men dette er ikke nødvendigvis alltid tilfellet i dag, spesielt om muligheten for kommunikasjonskanaler mellom partene er begrenset. I slike tilfeller kan en bli tvunget til å bruke direktemeldingsplattformer eller offentlige nettsider. Disse tredjepartene kan utføre bildeopperasjoner, slik som nedskalering, beskjæring eller komprimering for å spare diskplass eller løse andre forretningsmål. Disse passive angrepene vil i de fleste tilfeller ødelegge all gjemt steganografi informasjon i bildene. I denne oppgaven vil vi studere et utvalg steganografimetoder, spesifikt, minst signifikante bit (LSB), diskret wavelettransformasjon (DWT), Steghide, bildemetadata (EXIF) og filformatpolyglots og undersøke hvor godt de overlever mot slike bildetransformasjoner. For metodene som mislykkes, vil vi også foreslå visse forbedringer som med hell kan forbedre motstanden mot disse bildetransformasjonene.Steganography is the art of concealing information in other mediums without making it clear that information has been hidden. In image steganography, specifically, messages can be embedded into normal looking images, but which may contain secret embedded messages that are not visible to the naked eye. Digital image steganography has been thoroughly studied for many years and there are many different methods to choose from. Normally the premise for sending these images is however that the images will not be tampered with between the sender and receiver. This might however not always be the case, if the channel for communication is limited, then one might have to use direct messaging platforms or public website to which one upload images before the recipient receives them. These third-parties might perform transformation on these images, such as down scaling, cropping, or compressing them to save disk space or for other business goals. These passive attacks will in most cases destroy any embedded steganography information that has been embedded in the images. In this thesis we will study a selection of steganography methods, specifically, Least Significant Bit (LSB), Discrete Wavelet Transformation (DWT), Steghide, image metadata (EXIF) and file format polyglots and investigate how well they survive against such image transformations. For the methods that fail, we will also propose certain improvements that successfully are able to mitigate some of these image transformation operations

    Sleep patterns in congenital dopamine beta-hydroxylase deficiency

    Get PDF
    Sleep patterns of two young female patients with congenital dopamine beta-hydroxylase deficiency are described. In this orthostatic syndrome central and peripheral noradrenergic failure occurs as a result of impaired beta-hydroxylation of dopamine. Consequently, the levels of dopamine and its metabolites are elevated. The relative importance of noradrenaline deficit in the face of dopamine excess for sleep-regulatory mechanisms can be inferred from the sleep pattern of these patients. No subjective sleep complaints were reported. The sleep patterns showed a high percentage of slow-wave sleep in both patients (29% and 34% of sleep period time) and a relatively low to normal percentage of REM sleep (18% and 21%). A normal cyclic REM sleep pattern was observed. Alpha-delta sleep occurred during light sleep (15% and 8%); consequently, the amount of stage 2 sleep was reduced. These results indicate that functional insufficiency of the noradrenergic system in two patients with dopamine beta-hydroxylase deficiency is not associated with profound changes in the (REM) sleep pattern. This supports a modulatory or permissive role for noradrenaline in REM sleep mechanisms
    corecore