This research aims to estimate stock returns, according to the Rough Set Theory approach, test its effectiveness and accuracy in predicting stock returns and their potential in the field of financial markets, and rationalize investor decisions. The research sample is totaling (10) companies traded at Iraq Stock Exchange. The results showed a remarkable Rough Set Theory application in data reduction, contributing to the rationalization of investment decisions. The most prominent conclusions are the capability of rough set theory in dealing with financial data and applying it for forecasting stock returns.The research provides those interested in investing stocks in financial markets with significant financial analysis tools that exceed the traditional statistical methods. The originality of the research lies in the diversification of financial and statistical analysis tools and methods of forecasting stock returns
يهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة في العراق وفقاً لنظرية الذكاءات المتعددة عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر الذكاءات المتعددة في محتوى كتابي الحاسوب المقرران على طلبة المرحلة المتوسطة (الصفين الأول والثاني) للعام الدراسي (2017-2018) م؟ ولتحقيق هدف البحث اتبعت الباحثة منهج البحث الوصفي التحليلي (تحليل المحتوى)، واعتمدت الفكرة الصريحة وحده للتسجيل، أما أداة البحث فهي أداة
... Show MoreIn light of Chaos, the members of societies' general feeling of the system's importance often increases because they believe that they will lose all forms of security and safety if it does not exist. That is why they attribute such a high value to it, and the fear of the system's absence makes it inevitable for it to have continuity, for we live in a world full of surprises, rapid changes, confusion, and confusing
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAbstract. In this work, some new concepts were introduced and the relationship between them was studied. These concepts are filter directed-toward, nano-closure-directed-toward and nano-closure-converge to point, and some theories and results about these concepts were presented. A definition almost-nano-converges for set, almost-nano-cluster-point, and definition of quasi-nano-Hausdorff-closed and was also called nano-Hausdorff-closed relative, were also presented several theories related to these definitions were presented and the relationship between them was studied . We also provided other generalizations, including nano closure continuous mappings and it was also called as nano-weaklycontinuous- mappings, as well as providing a definit
... Show MoreThis study sought to understand how critical cultural awareness was in translating English idioms into Arabic, particularly in political news where clarity and precision are paramount. The challenges that arise from the linguistic and cultural disparities between the two languages include differences in metaphor, image, and cultural reference. The study demonstrates, through the lens of Skopos Theory, how efficient translation relies on the function and intent of the text taking precedence over word-for-word equivalence and cultural context. Overall, the study establishes the need to transform idioms so that they better align with what is appropriate given the expectations of the audience. The results highlight the importance of inn
... Show MoreThis study aims to examine the main features of the new trends in agenda studies using the secondary analytic approach in analyzing the newest studies in agenda-setting issues from 2007 till 2017, in addition to the quantitative approach.
The researcher has analyzed 110 studies -75 foreign and 35 Arabic - to determine, describe and evaluate the key research trends which came in Arabic and foreign agenda-setting studies. The results confirmed that studies of the agenda theory are increasing steadily worldwide with diversity in the theoretical trends and used research tools. In addition, primary studies focus on content analysis and the survey approach (method). Also, most Arabic agenda-setting studies used the traditional methods and k
This research is aiming to find the effective role of the personality characteristics of the Leader in business organization entrepreneurship by studying the effect of the special dimensions of personality characteristics (neuroticism, extraversion, openness, Agreeableness, and conscientiousness) on business organizations entrepreneurship dimensions representing in the two main dimensions (entrepreneurship direction and strategic entrepreneurship) across field study was conducted in thirteen private colleges in Baghdad.
The problem of the research relies in asking the question, is there an effect for Leader personality characteristics on business organizations entrepreneurship. and statistical methods hav
... Show MoreThis work, introduces some concepts in bitopological spaces, which are nm-j-ω-converges to a subset, nm-j-ω-directed toward a set, nm-j-ω-closed mappings, nm-j-ω-rigid set, and nm-j-ω-continuous mappings. The mainline idea in this paper is nm-j-ω-perfect mappings in bitopological spaces such that n = 1,2 and m =1,2 n ≠ m. Characterizations concerning these concepts and several theorems are studied, where j = q , δ, a , pre, b, b.
The theory of Topological Space Fiber is a new and essential branch of mathematics, less than three decades old, which is created in forced topologies. It was a very useful tool and played a central role in the theory of symmetry. Furthermore, interdependence is one of the main things considered in topology fiber theory. In this regard, we present the concept of topological spaces α associated with them and study the most important results.
This paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show More