Preferred Language
Articles
/
jeasiq-1023
The effect of the repurchase policy in stock tradingIn financial markets - case study
...Show More Authors

The research dealt with the case stock repurchase policy of Emaar Real Estate Company one of listed companies in Dubai Stock exchange. The research has launched from the cognitive dimensions of repurchasing policy which took great concern in the literatures of financial management, and also this policy became as substitute for distributing the monitory profit in the last three decades in the international financial markets, but it did not get any importance in the Arab Markets such as that of the Arab Gulf in addition to the Iraqi Stock Exchange.

The research summarized a set of conclusions, the most important one was the consistence of analysis result with the test of the major two hypotheses (The first and third ones) , and the inconstancy  with the major second hypothesis. The most important recommendations is that the Boards of directors of the listed companies in the financial markets have to choose the most suitable timings for the announcement of the repurchasing policy and not restore to this policy during the financial crisis to limit the reduction of the market value of their stocks in financial market.                                                                                                                        

                                                                       

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
IoT System on Dynamic Fish Feeder Based on Fish Existence for Agriculture Aquaponic Breeders
...Show More Authors

Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximaitly Prime Submodules and Some Related Concepts
...Show More Authors

In this research note approximately prime submodules is defined as a new generalization of prime submodules of unitary modules over a commutative ring with identity. A proper submodule  of an -module  is called an approximaitly prime submodule of  (for short app-prime submodule), if when ever , where , , implies that either  or . So, an ideal  of a ring  is called app-prime ideal of  if   is an app-prime submodule of -module . Several basic properties, characterizations and examples of approximaitly prime submodules were given. Furthermore, the definition of approximaitly prime radical of submodules of modules were introduced, and some of it is properties were established.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
العلاقة بين نوعية حياة العمل والإبداع التنظيمي (بحث تطبيقي في ديوان وزارة التخطيط)
...Show More Authors

    يهدف البحث الحالي إلى اختبار العلاقة بين نوعية حياة العمل والإبداع التنظيمي في ديوان وزارة التخطيط ، ولبلوغ الهدف المذكور وبناء على معطيات البحث الاستطلاعي للباحث بني ألانموذج الفرضي للبحث الذي ضم المتغير المستقل والمعتمد، واعتماداً على حركية الأنموذج صيغت فرضيتان، ولاختبار صحة الفرضيات وجمع المعلومات من عينة البحث البالغة (100) مدير يمثلون مرك

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Inorganica Chimica Acta
Synthesis, characterisation and electrochemistry of eight Fe coordination compounds containing substituted 2-(1-(4-R-phenyl-1H-1,2,3-triazol-4-yl)pyridine ligands, R = CH3, OCH3, COOH, F, Cl, CN, H and CF3.
...Show More Authors

Eight different Dichloro(bis{2-[1-(4-R-phenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})iron(II) compounds, 2–9, have been synthesised and characterised, where group R=CH3 (L2), OCH3 (L3), COOH (L4), F (L5), Cl (L6), CN (L7), H (L8) and CF3 (L9). The single crystal X-ray structure was determined for the L3 which was complemented with Density Functional Theory calculations for all complexes. The structure exhibits a distorted octahedral geometry, with the two triazole ligands coordinated to the iron centre positioned in the equatorial plane and the two chloro atoms in the axial positions. The values of the FeII/III redox couple, observed at ca. −0.3 V versus Fc/ Fc+ for complexes 2–9, varied over a very small potential range of 0.05 V.

... Show More
Preview PDF
Publication Date
Sat Dec 26 2020
Journal Name
International Journal Of Pharmaceutical Research
Complexes of Co(II), Cu(II), Ni(II), Pt(II) And Pd(II) with N 3 O-Chelating Ligand Incorporating Azo and Schiff Base Moieties: Synthesis, Spectroscopic, Thermal Decomposition, Theoretical Studies, and thermodynamic parameters
...Show More Authors

Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Charact'erizatio.n of new Schiff base ligand [(2-{1-[(2 hydraxy­ benzylidene)-hydrazono]-ethyl} benzene-I, 3, 5--triol.] and it's CQmp.lexes. with Co en\ Ni . (U),, c·u(U)' and · zn(II).
...Show More Authors

The eaction  of 2 4 .6-trihydroxyactophenonemonohydra1e  with

l hydr.azine monohydrate was realized ti·nder reflu.(( in methanol and i:l.

Jew drops of glacial acetic acid we.re added to give lhe'(int rmediate)

2-(1hydr pno-ctbyt)-benzcne-·1.3.5-r:Qql,       which      reacted     wittl

saEcy.laldehyde. jn methm)ql to gjy;e 'a new :tyRe CNzOi) Ligand  (H:flL]

f(2-{1-[(2-=bydroxy-bertzylide·ne)-bydrazqoo,J-e·thy.1}bcnze·neJ ;3·,5

of

 

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF