This research aims to estimate stock returns, according to the Rough Set Theory approach, test its effectiveness and accuracy in predicting stock returns and their potential in the field of financial markets, and rationalize investor decisions. The research sample is totaling (10) companies traded at Iraq Stock Exchange. The results showed a remarkable Rough Set Theory application in data reduction, contributing to the rationalization of investment decisions. The most prominent conclusions are the capability of rough set theory in dealing with financial data and applying it for forecasting stock returns.The research provides those interested in investing stocks in financial markets with significant financial analysis tools that exceed the traditional statistical methods. The originality of the research lies in the diversification of financial and statistical analysis tools and methods of forecasting stock returns
There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
The theoretical analysis depends on the Classical Laminated Plate Theory (CLPT) that is based on the Von-K ráman Theory and Kirchhov Hypothesis in the deflection analysis during elastic limit as well as the Hooke's laws of calculation the stresses. New function for boundary condition is used to solve the forth degree of differential equations which depends on variety sources of advanced engineering mathematics. The behavior of composite laminated plates, symmetric and anti-symmetric of cross-ply angle, under out-of-plane loads (uniform distributed loads) with two different boundary conditions are investigated to obtain the central deflection for mid-plane by using the Ritz method. The computer programs is built using Ma
... Show MoreThe present study focused mainly on the vibration analysis of composite laminated plates subjected to
thermal and mechanical loads or without any load (free vibration). Natural frequency and dynamic
response are analyzed by analytical, numerical and experimental analysis (by using impact hammer) for
different cases. The experimental investigation is to manufacture the laminates and to find mechanical
and thermal properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus,
longitudinal and transverse thermal expansion and thermal conductivity. The vibration test carried to
find the three natural frequencies of plate. The design parameters of the laminates such as aspect ratio,
thickness
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreA theoretical model is developed to determine time evolution of temperature at the surface of an opaque target placed in air for cases characterized by the formation of laser supported absorption waves (LSAW) plasmas. The model takes into account the power temporal variation throughout an incident laser pulse, (i.e. pulse shape, or simply: pulse profile).
Three proposed profiles are employed and results are compared with the square pulse approximation of a constant power.
This study identified intellectual and applied research in key variables (Strategic Control and Strategic Pitfalls) through internal dimensions then founded the (Federal Board of Supreme Audit) is the good area for analyzing the relationship and effect between variables by (125) questionnaire selected from (148) was distributed to the top and middle management as a seniors in controlling action. Appropriate methods, statistical tools, and programs were used to enhance the basic outputs, represented as a set of Conclusions and recommendations from the real control work with a specificity of potential Pitfalls in the effectiveness impact by Strategic Control in other dimensions which Studied.
Colonialism radically transformed the cultures of colonized peoples, often rupturing Indigenous traditions and folklore. Whether creating colonial discourse, promoting orientalist literature, advocating western educational institutions, or through biased media representations, imperial powers systematically oppressed Indigenous and Native peoples. Subjugated communities, however, created, and still form postcolonial discourse from their knowledge systems. This discourse insists on Indigenous and Native culture as central to Indigenous and Native peoples identity. This study examines the postcolonial literature of three groups: Kānaka Maoli, African Americans, and Iraqis. The scope of this dissertation scrutinizes how folklore is employed
... Show MoreThe aims of this thesis are to study the topological space; we introduce a new kind of perfect mappings, namely j-perfect mappings and j-ω-perfect mappings. Furthermore, we devoted to study the relationship between j-perfect mappings and j-ω-perfect mappings. Finally, certain theorems and characterization concerning these concepts are studied. On the other hand, we studied weakly/ strongly forms of ω-perfect mappings, namely -ω-perfect mappings, weakly -ω-perfect mappings and strongly-ω-perfect mappings; also, we investigate their fundamental properties. We devoted to study the relationship between weakly -ω-perfect mappings and strongly -ω-perfect mappings. As well as, some new generalizations of some definitions wh
... Show MoreLet G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric