Preferred Language
Articles
/
jeasiq-209
A reflection of increased financing Equity on returns commons stocks
...Show More Authors

The research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.

This research has included some of the theoretical concepts to each of the Equity financing common shares and returns common shares and adopted a search on the Iraqi Central Bank which committed listed on the Iraq Stock Exchange corporate decision (the banking sector) to increase funding for the Equity common shares to 250 million Iraqi dinars at a the lowest, so the population comprised shareholding companies listed on the Iraq Stock Exchange (the banking sector), while the sample has been selected in intentional represented by four companies from the companies that completed respond to the decision of the Iraqi Central Bank requirements to increase funding for the Equity common shares to 250 million Iraqi dinars at a minimum, and has extended the period of research during the period 2014-2009, and used a set of indicators and financial methods to measure the Mngert research and has also been relying on Mjuah of statistical methods in the relationship between the variables and test hypotheses, in order to verify proof of hypotheses have been used simple linear regression  as well as the use of interpretation coefficient (identification) for the purpose of measuring Maevsrh independent variable proportion of the changes influenced by the now variable search . The research findings indicated the existence of a significant effect of the increase in Equity financing by issuing new common shares in the revenue ordinary shares.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Review on Heat Transfer Process Inside Open and Closed Porous Cavity
...Show More Authors

Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamics and its Effects on Saturation Region in Semiconductor Optical Amplifiers
...Show More Authors

We focus on studying the dynamics of bulk semiconductor optical amplifiers and their effects on the saturation region for short pulse that differ, however there is the same unsaturated gain for both dynamics. Parameters like current injection, fast dynamics present by carrier heating (CH), and spectra hole burning (SHB) are studied for regions that occur a response to certain dynamics. The behavior of the saturation region is found to be responsible for phenomena such as recovery time and chirp for the pulse under study.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Dynamic Fault Tolerance Aware Scheduling for Healthcare System on Fog Computing
...Show More Authors

 Internet of Things (IoT) contributes to improve the quality of life as it supports many applications, especially healthcare systems. Data generated from IoT devices is sent to the Cloud Computing (CC) for processing and storage, despite the latency caused by the distance. Because of the revolution in IoT devices, data sent to CC has been increasing. As a result, another problem added to the latency was increasing congestion on the cloud network. Fog Computing (FC) was used to solve these problems because of its proximity to IoT devices, while filtering data is sent to the CC. FC is a middle layer located between IoT devices and the CC layer. Due to the massive data generated by IoT devices on FC, Dynamic Weighted Round Robin (DWRR)

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Triple Γ-Homomorphisms and Bi - Γ -Derivations on Jordan Γ-algebra
...Show More Authors

In this paper, we introduce the concept of Jordan  –algebra, special Jordan  –algebra and triple  –homomorphisms. We also introduce Bi -  –derivations and Annihilator of Jordan algebra. Finally, we study the triple  –homomorphisms and Bi -  –derivations on Jordan algebra.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (17)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Central European Agriculture
Seed priming effect on field emergence and grain yield in sorghum
...Show More Authors

Most cultivars of sorghum have low field emergence as common problem. Three experiments were carried out at Agriculture College, Baghdad University. First experiment was conducted in laboratory according to Complete Randomized Design (CRD) with four replicates. Second and third experiments were conducted at field according to Randomized Complete Block Design (RCBD) during the spring and the fall seasons of 2015, respectively, with four replicates for each one. Same two factors were studied at each experiment. First factor was seed priming by seed soaking for 10 hours in distilled water, solvents of GA3, KCl and thiamine (300, 40 and 30 mg*L-1, respectively) and non-primed seed. Second factor was three cultivars of sorghum (Inqath, Kafier an

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (14)
Scopus Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
The Land Use and Land Cover Classification on the Urban Area
...Show More Authors

     The Land Use/ Land Cover (LULC) is an essential application in many remotely sensed projects and problems. Land use is simply man-made objects such as urban, road complex targets, etc., while land covers are defined as any target and phenomenon that appear neutral. The LULC study is essential for all current and future engineering projects, as it shows the nature of the land's components, which is evident in studying and modernizing residential areas. One of the essential operations for studying LULC is the heterogeneity detection and classification calculations of satellite images and topographic maps. A part of the Baghdad, Iraq region was selected for the Landsat satellite group at different periods to detect variance and mak

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref