This research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio
... Show MoreObjectives: To assess the qualifications and performance of newly graduated pharmacists and explore factors that affect their performance in public hospitals. Methods: This qualitative study included face-to-face, semi-structured interviews with hospital practitioner pharmacists. It was conducted between March and May 2023 in Kerbala province, Iraq. The participating pharmacists were selected purposefully because they had three or more years of work experience at governmental hospitals. The audio-recording interviews were transcribed. Thematic analyses were used to generate themes and subthemes from the interviews. Results: Twenty-seven hospital pharmacists participated in this study. The study found that there are several factors t
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreHuman skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreObjectives: The study aims to identify the effects of an educational program on patients’ knowledge about vascular access care and to find out the relationship between patients knowledge scores and their selected demographic variable. &
... Show MoreAbstract: The research covered five chapters: So, the first chapter definition of the research is from the introduction to the research and its importance, as the importance of the research lies in an expression of the reality of e-learning as it is one of the new patterns of the educational process and its role in enhancing communication and interconnectedness between the learners from the students ’point of view Physical Education and Sports Sciences for Girls, University of Baghdad, as for the problem The research was, and through the researcher’s acquaintance with many previous studies, references and sources, and being a student at the College of Physical Education and Sports Sciences - University of
... Show MoreMM ABDUL-WAHHAB, SA AHMED, International Journal of Pharmaceutical Research, 2020 - Cited by 2