ه رثا قيقحتلو ،ةيبساحملا تامولعملا ةميق ةمئلام يف قيقدتلا ةنجلل ةيبساحملاو ةيلاملا ةربخلاو ةيللاقتسلاا ثحبلا تايضرف رابتخلا ةمزلالا تانايبلا عمجل ةنابتسا ةرامتسا مادختساب ةثحابلا تماق ةساردلا فده ةللاد وذ رثأ دجوي(يهو ةيبساحملاو ةيلاملا ةربخلل ةيئاصحإ ةللاد وذ رثا دجوي( ، )ةيبساحملا تامولعملا ةميق ةمئلام ىلع قيقدتلا ةنجل ةيللاقتسلا ةيئاصحا )ةيبساحملا تامولعملا ةميق ةمئلام ىلع ( نم تنوكت ةنيع ىلع تعزو ثيح ، 102 ترهظا دقو.فراصملا يف نيلماعلا نم ادرف ) ن ،ةيبساحملا تامولعملا ةميق ةمئلام ىلع قيقدتلا ةنجل ةيللاقتسلا ةيئاصحا ةللاد وذ رثا كانه ناب يفصولا يئاصحلاا ليلحتلا جئات ىلعءانبو.ةيبساحملا تامولعملا ةميق ةمئلام ىلع ةيبساحملاو ةيلاملا ةربخلل ةيئاصحا ةللاد وذ رثا دوجو جئاتنلا تنيب كلذكو دقت مت ةساردلا جئاتن نم تايصوت ةدع مي ةنجل يف ايلام اريبخ اوضع دوجو نع لاضف ،نيلقتسم ءاضعا دوجو ةرورض اهمها يف ةدراولا ةيبساحملا تامولعملا ةميق ةمئلام يف نيرمثتسملا ةقث ةدايز ىلا كلذ يدؤي دقو اهتيلعاف ىلع ارشؤم دعي ثيح قيقدتلا لاا مهرارق ىلع رثؤت دق اهرودب يتلاو ةيلاملا مئاوقلا .
The research dealt with the case stock repurchase policy of Emaar Real Estate Company one of listed companies in Dubai Stock exchange. The research has launched from the cognitive dimensions of repurchasing policy which took great concern in the literatures of financial management, and also this policy became as substitute for distributing the monitory profit in the last three decades in the international financial markets, but it did not get any importance in the Arab Markets such as that of the Arab Gulf in addition to the Iraqi Stock Exchange.
The research summarized a set of conclusions, the most important one was the consistence of analysis result with the test of the major two hypotheses (The first
... Show Moreبهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAs regional development, as a matter of course, poses a number of systemic, scientific and political problems. While the issue of development is primarily at the national level to the limits of World War II in the industrialized world and to the 1960s borders in most Third World countries, the increasing awareness of regional disparities has led to the regional issue Were taken into consideration in the early 1960s and 1970s in most industrialized and developing countries alike. The local issue was only introduced in the early 1980s. The awareness of regional disparities and the fact that the regions do not have the same potential and that some regions have the resources to enable them to develop, grow and develop, unlike other r
... Show Moreيكتسب موضوع تدريب وتطوير العاملين أهمية بالغة في الظروف الاقتصادية الحالية التي تسودها مفاهيم وتوجهات جديدة كعولمة الاقتصاد ورأس المال المعرفي والفكري، وحيث صارت المعارف والمهارات والقابليات التي يمتلكها العاملون محركاً أساسياً باتجاه النجاح، وعنصراً مهماً في زيادة فاعلية منشأة الأعمال، وإدامة وجودها واستمرارها.
إن العاملين المدربين بشكل جيد على عمليات المنشأة وطبيعة المواد التي تستخدمها وإنتاجه
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreE-commerce is the most important result of information technology in this day and age, has resulted in the use of commercial transactions to changes in economic, social, and psychological, and produced a new type of shopping, jobs, and create new job opportunities, and changed the traditional work environment. The challenge currently facing economic units is how to transfer this technology and its integration within the community, especially after the massive developments that have occurred in the areas of commercial and congested markets units, the economic and the products and services the many and varied and intensified competition among these units to achieve a profit, leading to the emergence of e-commerce as on
... Show MoreThe aim of this research was to analyze the financial reporting requirements of segmental information that stipulated by the Iraqi accounting rules, investigating the extent of it compliance with the requirements of the International Financial Reporting Standard No.8 (IFRS 8) and the Statement of Financial Standards No.131 (SFAS 131). Also the research aimed to identify the segmental disclosure practices in listed corporations on Iraq Stock Exchange (ISX), basing on a hypotheses said that “the insufficient of Iraqi financial reporting requirements of segmental information affect<
... Show Moreيعد علم أصول الفقه السبيل إلى استنباط الأحكام من النصوص الشرعية، وبقواعده يسدد المجتهد نظره في أحكام الشريعة ويعينه على الوصول إلى الحقيقة. فهو علم دقيق المسلك، يقصده كل من يتحاشى السطحية في فهم النصوص الشرعية وتفسيرها وتكييف الوقائع والتصرفات الشرعية على النصوص تكييفا صحيحا يعصم العقل عن الخطأ، فهو بالنسبة إلى العلوم الشرعية كالنحو بالنسبة إلى العلوم العربية. وقد نال هذا العلم من جهد العلماء الحظ الأكبر وا
... Show More