The purpose of this research is to test the ability of the true strength index To time and manage trading in the financial market to select the best stocks and achieve a higher return than the Simple buy and hold strategy. And To achieve the objectives of the research, it relied on the main hypothesis, which is By using the True Strength Index to manage trading decisions buying and selling, can be achieved higher returns than the buy and hold strategy . The research community has been identified with all stocks listed on the Iraq Stock Exchange. Implementing the financial research tests requires selecting a sample from the research community that fulfills the test requirements according to a number of conditions So (38) companies we
... Show MoreThis paper aims to study the biosorption for removal of lead, cadmium, copper and arsenic ions using algae as a biosorbent. A series of experiments were carried out to obtain the breakthrough data in a fluidized bed reactor. The minimum fluidization velocities of beds were found to be 2.27 and 3.64 mm/s for mish sizes of 0.4-0.6 and 0.6-1 mm diameters, respectively. An ideal plug flow model has been adopted to characterize the fluidized bed reactor. This model has been solved numerically using MATLAB version 6.5. The results showed a well fitting with the experimental data. Different operating conditions were varied: static bed height, superficial velocity and particle diameter. The breakthrough curves were plotted for each metal. Pb2+ s
... Show MoreSolar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both so
... Show MoreThis research was aimed to determine the petrophysical properties (porosity, permeability and fluid saturation) of a reservoir. Petrophysical properties of the Shuiaba Formation at Y field are determined from the interpretation of open hole log data of six wells. Depending on these properties, it is possible to divide the Shuiaba Formation which has thickness of a proximately 180-195m, into three lithological units: A is upper unit (thickness about 8 to 15 m) involving of moderately dolomitized limestones; B is a middle unit (thickness about 52 to 56 m) which is composed of dolomitic limestone, and C is lower unit ( >110 m thick) which consists of shale-rich and dolomitic limestones. The results showed that the average formation water
... Show MoreIn this paper, we made comparison among different parametric ,nonparametric and semiparametric estimators for partial linear regression model users parametric represented by ols and nonparametric methods represented by cubic smoothing spline estimator and Nadaraya-Watson estimator, we study three nonparametric regression models and samples sizes n=40,60,100,variances used σ2=0.5,1,1.5 the results for the first model show that N.W estimator for partial linear regression model(PLM) is the best followed the cubic smoothing spline estimator for (PLM),and the results of the second and the third model show that the best estimator is C.S.S.followed by N.W estimator for (PLM) ,the
... Show MoreArray antennas have an interesting role in the radio astronomy field. The array antennas allow astronomers to obtain high-resolution signals with high sensitivity to weak signals. This paper estimates the meteors' positions entering the Earth's atmosphere and develops a simulation for array antenna radar to analyze the meteor's echoes. The GNU radio software was used to process the echoes, which is a free open-source software development toolkit that provides signal processing blocks to implement in radio projects. Then, the simulation determines the azimuth and elevation of the meteors. An improved Multiple Signal Classification (MUSIC) algorithm has been suggested to analyze these echoes. The detected power of each meteor echo has
... Show MoreA rapid, simple and sensitive spectrophotometric method for the determination of trace amounts of chromium is studied. The method is based on the interaction of chromium with indigo carmine dye in acidic medium and the presence of oxalates as a catalyst for interaction, and after studying the absorption spectrum of the solution resulting observed decrease in the intensity of the absorption. As happened (Bleaching) for color dye, this palace and directly proportional to the chromium (VI) amount was measured intensity of the absorption versus solution was figurehead at a wavelength of 610 nm. A plot of absorbance with chromium (VI) concentration gives a straight line indicating that Beer’s law has been obeyed over the range of 0.5
... Show MoreIn this work, laboratory experiments were carried out to verify direct contact membrane distillation system’s performance in highly saline water desalination. The study included the investigation of various operating conditions, like feed flow rate, temperature and concentration of NaCl solution and their impact on the permeation flux were discussed. 16 cm2 of a flat sheet membrane module with commercial poly-tetra-fluoroethylene (PTFE) membrane, which has 0.22 μm pore size, 96 µm thickness and 78% average porosity, was used. A high salt rejection factor was obtained greater than 99.9%, and the permeation flux up to 17.27 kg/m2.h was achieved at 65°C for hot feed side and 20°C for cold side stream.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More