Recently, the financial mathematics has been emerged to interpret and predict the underlying mechanism that generates an incident of concern. A system of differential equations can reveal a dynamical development of financial mechanism across time. Multivariate wiener process represents the stochastic term in a system of stochastic differential equations (SDE). The standard wiener process follows a Markov chain, and hence it is a martingale (kind of Markov chain), which is a good integrator. Though, the fractional Wiener process does not follow a Markov chain, hence it is not a good integrator. This problem will produce an Arbitrage (non-equilibrium in the market) in the predicted series. It is undesired property that leads to erroneous conclusion, as it is not possible to build a mathematical model, which represents the financial phenomenon. If there is Arbitrage (unbalance) in the market, this can be solved by Wick-Ito-Skorohod stochastic integral (renormalized integral). This paper considers the estimation of a system of fractional stochastic differential equations (FSDE) using maximum likelihood method, although it is time consuming. However, it provides estimates with desirable characteristic with the most important consistency. Langevin method can be used to find the mathematical form of the functions of stochastic differential equations. This includes drift and diffusion by estimating conditional mean and variance from the data and finding the suitable function achieves the least error, and then estimating the parameters of the model by numerical optimal solution search method. Data used in this paper consist of three banking sector stock prices including Baghdad Bank (BBOB), the Commercial Bank (BCOI), and the National Bank (BNOI). © 2020 International University of Sarajevo.
Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show MoreBACKGROUND: Color Vision Deficiency (CVD) is mostly an inherited trait and is not an uncommon problem. Prevalence of CVD differs among different ethnic and geographic properties of the population that affect their genetic constitution. Ishihara plates remain an internationally accepted tool for screening red-green CVD. OBJECTIVE: To determine the prevalence of red-green CVD among adult males from Baghdad province. PATIENTS AND METHODS: One thousand and five (1005) adult males were enrolled in this study, using a systematic sampling technique, and were screened for CVD utilizing 24-plate Ishihara plates and re-tested by EnChroma 39-Color plates. All males were residing in Baghdad and the center of Iraq. RESULTS: Among all tested males, 948 r
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreRandom throwing of industrial waste has a significant impact on the environment unless it takes into account the conditions of engineered destroying and/or re-used. Taking the advantage of re-using waste materials in engineering projects represents a well-planned project in order to resolve a lot of engineering problems for some difficult soils. The objective of this study was to evaluate the capability and effects of Rubber Shreds (RS) from scrap torn belts towards improving the shear strength of soft clay. A direct shear tests were conducted on soft clay-RS mixture. The following parameters were investigated to study the influence of RS content, water content, normal stress, and dilation ratio. From experimental test results it was fou
... Show MoreProbiotics are live microbes that give many health benefits to human beings and animals, the most studied and commonly used probiotics are Gram-positive bacteria; lactobacilli and bifidobacteria. At nowadays, Lactobacillus spp. constitute more than two-thirds of the total numbers of probiotic species. The present study aimed to characterize Lactobacillus that locally isolated from human mouth and feces as probiotics. A total of three Lactobacillus isolates; Lactobacillus fermentum Lb2, Lactobacillus rhamnosus Lb9, and Lactobacillus paracasei Lb10 were investigated in respect to acid and bile salts tolerance, antibiotics susceptibility, and cell surface hydrophobicity in vitro using bacterial adhesion to hydrocarbons method. In compa
... Show MoreThis study aims to deeply analyze the character of serial killers in Thomas Harris’ novels and focuses on his novel Red Dragon. The Study searches in these complex and deep characters through the use of Erich Fromm's concepts about the destructive nature of the human psyche and what are the factors affecting serial killers in all social psychological, and biological aspects. This study Concluded: Thomas Harris portrayed the characters of serial killers in a professional and complex and made the reader go on a contemplative journey in the mind and soul of the serial killer, thus reaching the climax of artistic perfection.
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreBackground: Hybrid diabetes (or double diabetes, DD) occur when the patient which exhibits characteristics that combine type 1 diabetes (T1DM) and type 2 diabetes (T2DM). Formerly epidemiological studies found that quarter of people with T1D also had the metabolic syndrome. Subfatin, Also called cometin, it is a small (~27kDa) cytokine secreted by protein encoded by a gene called METRNL (simeler of meteorin). is much expressed in skin in the mucosal tissues and activated macrophages. Subfatin has also been described as a hormone that effected in some diseases such as metabolic diseases (including dyslipidemia), type 2 diabetes and obesity. Objectives: The current study objective is evaluating the subfatin in the blood serum of double diabet
... Show More