This research aims to estimate stock returns, according to the Rough Set Theory approach, test its effectiveness and accuracy in predicting stock returns and their potential in the field of financial markets, and rationalize investor decisions. The research sample is totaling (10) companies traded at Iraq Stock Exchange. The results showed a remarkable Rough Set Theory application in data reduction, contributing to the rationalization of investment decisions. The most prominent conclusions are the capability of rough set theory in dealing with financial data and applying it for forecasting stock returns.The research provides those interested in investing stocks in financial markets with significant financial analysis tools that exceed the traditional statistical methods. The originality of the research lies in the diversification of financial and statistical analysis tools and methods of forecasting stock returns
In this work, an important sugar alkynyl ether has been synthesized in two subsequent steps starting from commercially available D-galactose (3). This kind of compounds is highly significant in the synthesis of biologically active molecules such as 1,2,3-triazole and isoxazoles. In the first step, galactose (3) was reacted with acetone in the presence of anhydrous copper (II) sulfate to produce 1,2:3,4-di-O-isopropylidene-α-D-galactose (4) in good yield. The latter was reacted with excess of 3-bromoprop-1-yne in DMF in the presence of NaOH pellets to afford the target molecule 5 in a very good yield. The temperature of this step is crucial in determining the reaction yi
... Show Moreيهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة في العراق وفقاً لنظرية الذكاءات المتعددة عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر الذكاءات المتعددة في محتوى كتابي الحاسوب المقرران على طلبة المرحلة المتوسطة (الصفين الأول والثاني) للعام الدراسي (2017-2018) م؟ ولتحقيق هدف البحث اتبعت الباحثة منهج البحث الوصفي التحليلي (تحليل المحتوى)، واعتمدت الفكرة الصريحة وحده للتسجيل، أما أداة البحث فهي أداة
... Show MoreIn light of Chaos, the members of societies' general feeling of the system's importance often increases because they believe that they will lose all forms of security and safety if it does not exist. That is why they attribute such a high value to it, and the fear of the system's absence makes it inevitable for it to have continuity, for we live in a world full of surprises, rapid changes, confusion, and confusing
Abstract. In this work, some new concepts were introduced and the relationship between them was studied. These concepts are filter directed-toward, nano-closure-directed-toward and nano-closure-converge to point, and some theories and results about these concepts were presented. A definition almost-nano-converges for set, almost-nano-cluster-point, and definition of quasi-nano-Hausdorff-closed and was also called nano-Hausdorff-closed relative, were also presented several theories related to these definitions were presented and the relationship between them was studied . We also provided other generalizations, including nano closure continuous mappings and it was also called as nano-weaklycontinuous- mappings, as well as providing a definit
... Show MoreThis study sought to understand how critical cultural awareness was in translating English idioms into Arabic, particularly in political news where clarity and precision are paramount. The challenges that arise from the linguistic and cultural disparities between the two languages include differences in metaphor, image, and cultural reference. The study demonstrates, through the lens of Skopos Theory, how efficient translation relies on the function and intent of the text taking precedence over word-for-word equivalence and cultural context. Overall, the study establishes the need to transform idioms so that they better align with what is appropriate given the expectations of the audience. The results highlight the importance of inn
... Show MoreThis study aims to examine the main features of the new trends in agenda studies using the secondary analytic approach in analyzing the newest studies in agenda-setting issues from 2007 till 2017, in addition to the quantitative approach.
The researcher has analyzed 110 studies -75 foreign and 35 Arabic - to determine, describe and evaluate the key research trends which came in Arabic and foreign agenda-setting studies. The results confirmed that studies of the agenda theory are increasing steadily worldwide with diversity in the theoretical trends and used research tools. In addition, primary studies focus on content analysis and the survey approach (method). Also, most Arabic agenda-setting studies used the traditional methods and k
This work, introduces some concepts in bitopological spaces, which are nm-j-ω-converges to a subset, nm-j-ω-directed toward a set, nm-j-ω-closed mappings, nm-j-ω-rigid set, and nm-j-ω-continuous mappings. The mainline idea in this paper is nm-j-ω-perfect mappings in bitopological spaces such that n = 1,2 and m =1,2 n ≠ m. Characterizations concerning these concepts and several theorems are studied, where j = q , δ, a , pre, b, b.
The theory of Topological Space Fiber is a new and essential branch of mathematics, less than three decades old, which is created in forced topologies. It was a very useful tool and played a central role in the theory of symmetry. Furthermore, interdependence is one of the main things considered in topology fiber theory. In this regard, we present the concept of topological spaces α associated with them and study the most important results.
This paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More