Preferred Language
Articles
/
jeasiq-1486
Investment Perspective According to Behavioral Finance Science
...Show More Authors

The first thing that comes to mind is the highly important question of whether there were some effects of human behavior and its fluctuations on the theories of the efficient market and the contemporary investment portfolio. According to what has been said by the proponents of these two theories; when the optimal return is realized, the efficiency of the market is achieved in terms of perfect information on prices and risk that supposed to be predetermined in a rational way.

he other question that imposed here is “at what time people should be rational in their investments in the security markets ?”. This means that investors are rational for their efforts devoted to utility maximization, which are perceived as a result of investing their wealth in the best possible manner.

Then, can those two questions be achieved in practice? Many ontological aspects are influenced in their relations by emotions and feelings more than by money as a financial resource . Investors may take irrational financial decisions because of the dominance of those emotions and feelings compared with what investors do toward other actions in their public and special daily life.

Understanding investors financial awareness without taking into account the human action is considered as an outstanding problem which can be assimilated as an attempt to sail with compass, but without guided maps. The importance and necessity of human psychological factor are arise when we are talking about investing common stocks in the security market. Then, this means that issues directing investment decisions of individuals in financial assets whether they were stocks or bonds, can be only interpreted with referring to principles of human behavior.

Absolutely there is no exaggeration if we said that the market in general be advanced, lagged behind , prospected , and crept when making collective  decisions in buying securities through viewing  psychological factors which capture individuals behaviors after information being collected and analyzed. The validity of an efficient market theory has been widely accepted by its proponents for a long time lasting almost a century so that any research on  the psychological aspects of a security market encountered by objection till a close time of ten years .

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 04 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
CHIA SEEDS ARE USED TO PRODUCE GLUTEN-FREE BISCUITS: CHIA SEEDS ARE USED TO PRODUCE GLUTEN-FREE BISCUITS
...Show More Authors

White and black chia seeds were used in some food products, such us gluten –free biscuits processing by using rice flour and chia seeds (white and black) with these amonths 112.5, 74.25, 56.25, 27.5 g with 27.5g of quinoa seeds for treatments 1, 2, 3 and 4 respectively, and comparison sensitively with the control treatment which has no additions including the appearance and homogenization of the product, surface cracks, softness, taste and flavor, core color and the specific volume, some microbiological tests were performed for biscuit product after storage for 4 months at 30 and 50°C including bacterial total count and fungal and yeast count, results showed that there weren’t any observation of bacteria or yeast or fungal growth at

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Self-image addiction (Salafi) and its relation to narcissistic personality disorder among students
...Show More Authors

Abstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
RADAR PARAMETER GENERATION TO IDENTIFY THE TARGET
...Show More Authors

Due to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi National Journal Of Chemistry
Adsorption of Cefixime on to Iraqi Bentonite
...Show More Authors

In this study the adsorption of cefixime on to selected Iraqi clay bentonite. The aim of this study is to search for selective active surface in adsorption of the drug and to act as physical antidotes in treatment of poisoning if the drug is taken in quantities higher than the recommended dosages. Quantitative estimation of the drug adsorption has been done by utilizing the technique of UV spectrophotometry in λmax (273) nm at different conditions of temperature (25, 37, 45) ˚C found the adsorption decrease with increase the temperature. Study of clay weight of bentonite (0.1-1.5) gm found the adsorption increase with increase of clay weight, study effect of pH (1.2, 3, 5, 7) on adsorption of bentonite found the optimum adsorption

... Show More
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Provisions related to nails in Islamic Fiqh
...Show More Authors

Provisions related to nails in Islamic Fiqh

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 23 2021
Journal Name
Reviews In Chemical Engineering
Molybdenum nitrides from structures to industrial applications
...Show More Authors

Owing to their remarkable characteristics, refractory molybdenum nitride (MoN x )-based compounds have been deployed in a wide range of strategic industrial applications. This review reports the electronic and structural properties that render MoN x materials as potent catalytic surfaces for numerous chemical reactions and surveys the syntheses, procedures, and catalytic applications in pertinent industries such as the petroleum industry. In particular, hydrogenation, hydrodesulfurization, and hydrodeoxygenation are essential processes in the refinement of oil segments and their conversions into commodity fuels and platform chemicals. N-vacant sites over a catalyst’s surface are a significant driver of diverse chemical phenomena. Studies

... Show More
Preview PDF
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Production of specific brucellin to diagnose Brucellosis
...Show More Authors

act : A soluble cytoplasmic antigen (Brucellin) was prepared from Brucella melitensis Rev1 and used to diagnose brucellosis in experimentally infected mice with virulent strains of Brucella melitensis and Brucella abortus two weeks after infection. The best result was obtained with the third peak of the four peaks. All four peaks were used as antigen for skin test in a group of mice two weeks after vaccinated with S19 vaccine and the best result was obtained with third peak. All four peaks were also used as antigen for skin test in a group of mice previously vaccinated with Listeria monocytogenes live attenuated vaccine. All four fractions of the extracted brucellin antigens exhibited a negative skin test result in Listeria monocytogenes ex

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref