Preferred Language
Articles
/
jeasiq-638
Theories of the structure of modern finance : practical application of pecking order theory and the life cycle of the company/analytical research of asmple of foreign companies
...Show More Authors

 Is the subject of the financial structure of the most important topics for which she received the interests of scientific research in the field of financial management , as it emerged several theories about choosing a financial structure appropriate for the facility and behavior change funding them , and in spite of that there is no agreement on a specific theory answer various questions in this regard , and a special issue of the financial structure optimization.

The objective of the research was to identify the most important theories of the structure of modern financial theory has been to focus on the capture of financial firms in two different stages of their life cycle , so-called growth and maturity.

As demonstrated research variables in one variable independently , which represents the rate of sales growth as it turns variable adopted in the rate of growth in retained earnings , while the research community has been represented by (23) U.S. companies large and diverse activities listed in the fortune 500, has been using some statistical methods The task of calculating t) tabular (f t) calculated ( to see the strength of the association between the two variables and were used as well as (f spreadsheet ( and f) the calculated ( to see the degree of influence between the two variables .

The research has come to several conclusions was the most prominent of the existence of a variety of factors and hidden phenomenon that will affect the behavior followed by funding companies through the stages of their life cycle is the most important of these factors retained earnings . The most important recommendations that came out of the current research is to encourage companies to pay attention to the life cycle of established financial terms and define the behavior of financial companies followed at every stage

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Social Graphic Design and its Reflection in Combating Drug Abuse: محمد عباس مظهر الزيدي
...Show More Authors

Social graphic design is the design that realizes the role and responsibility of the designer in society, and the use of graphic design in bringing about social change, especially as it is a professional contribution that plays an important role in the behavioral development of societies, and through the above, the researcher found a logical justification for his research problem, which is summarized by the following question: (What is the concept of Social Graphic Design and its implications in the fight against drug abuse)
While the two objectives of the research were identified in defining the social graphic design and its effect on combating drug abuse, and the theoretical framework was divided into two topics, the first study dea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Pathological And Immunological Study On Infection With Escherichia Coli In ale BALB/c mice
...Show More Authors

View Publication
Scopus (81)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Ecological Engineering
Chlorpyrifos Removal from Aqueous Solutions by Emulsion Liquid Membrane – Stability, Extraction, and Stripping Studies
...Show More Authors

Crossref (4)
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Inverting Gravity Data to Density and Velocity Models for Selected Area in Southwestern Iraq
...Show More Authors

The gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km.

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Aug 18 2022
Journal Name
Sustainability
A Sustainable Cold Mix Asphalt Mixture Comprising Paper Sludge Ash and Cement Kiln Dust
...Show More Authors

Concerns about the environment, the cost of energy, and safety mean that low-energy cold-mix asphalt materials are very interesting as a potential replacement for present-day hot mix asphalt. The main disadvantage of cold bituminous emulsion mixtures is their poor early life strength, meaning they require a long time to achieve mature strength. This research work aims to study the protentional utilization of waste and by-product materials as a filler in cold emulsion mixtures with mechanical properties comparable to those of traditional hot mix asphalt. Accordingly, cold mix asphalt was prepared to utilize paper sludge ash (PSA) and cement kiln dust (CKD) as a substitution for conventional mineral filler with percentages ranging fro

... Show More
View Publication
Scopus (22)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Al-kindy College Medical Journal
Awareness Regarding Diabetes Risk Factors, Prevention and Management among Community Members in Diyala/Baqubah
...Show More Authors

Background: Background: Diabetes mellitus is a life-threatening disease. Global prevalence of diabetes mellitus is increasing rapidly providing a worrying indication and major threat to global health unless interventions are created through community awareness and knowledge regarding different aspect of DM.

Aims: To assess the level of awareness regarding diabetes risk factors, prevention and management among community members in Baqubah city and to identify any association between awareness level and some variables.

Methods: Across sectional study was carried out from the 1st of January - 30th of November 2019 in all primary health care centers (six centers) in center of Baqubah city. A convenien

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Compared with Genetic Algorithm Fast – MCD – Nested Extension and Neural Network Multilayer Back propagation
...Show More Authors

The study using Nonparametric methods for roubust to estimate a location and scatter it is depending  minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .       

It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 25 2021
Journal Name
Caai Transactions On Intelligence Technology
Shoulder girdle recognition using electrophysiological and low frequency anatomical contraction signals for prosthesis control
...Show More Authors

View Publication Preview PDF
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref