This research aims to estimate stock returns, according to the Rough Set Theory approach, test its effectiveness and accuracy in predicting stock returns and their potential in the field of financial markets, and rationalize investor decisions. The research sample is totaling (10) companies traded at Iraq Stock Exchange. The results showed a remarkable Rough Set Theory application in data reduction, contributing to the rationalization of investment decisions. The most prominent conclusions are the capability of rough set theory in dealing with financial data and applying it for forecasting stock returns.The research provides those interested in investing stocks in financial markets with significant financial analysis tools that exceed the traditional statistical methods. The originality of the research lies in the diversification of financial and statistical analysis tools and methods of forecasting stock returns
A winglet is devices attached at the wing tips, used to improve aircraft wing efficiency by reduction influence wing tips vortices and induct drag, increasing lift force at the wing tips and effective aspect ratio without adding greatly to the structural stress and weight in the wing structure. This paper is presented three-dimensional numerical analysis to proposed modification swept back wing by adding Raked winglets devices at the main wing tips belong the two seat trainer aircraft type Aermacchi Siai S211 by using Fluent ANSYS 13 software. CFD numerical analysis process was performed at the same flight boundary conditions indifferent wing angle of attacks with constant air flow velocity V∞ =50 (m/sec), ambient pressure Po=101325 (P
... Show MoreBuckling and free vibration analysis of laminated rectangular plates with uniform and non uniform distributed in-plane compressive loadings along two opposite edges is performed using the Ritz method. Classical laminated plate theory is adopted. The static component of the applied in- plane loading are assumed to vary according to uniform, parabolic or linear distributions. Initially, the plate membrane problem is solved using the Ritz method; subsequently, using Hamilton’s variational principle, linear homogeneous algebraic equations in terms of unknown are generated, the set of linear algebraic equations can be solved as an Eigen-value problem. Buckling loads for laminated plates with different combinations of bounda
... Show MoreAbstract\
Dealing economic units at the present time with an industrial environment characterized by competitiveness and the pace of change and its strength as a result of this changing environment shall be on those who made it to adopt strategies that allow them to confront these variables and work in order to meet the market requirements of quality and price appropriate products to suit and the demand for those products and conditions to maintain
its competitive position and its development.
As a result, it became the subject of competitiveness in recent years and enjoys widespread attention at the global level. And in order to keep up
... Show Moreيناقش هذا البحث مشكلة التعدد الخطي شبه التام في انموذج الانحدار اللاخطي ( انموذج الانحدار اللوجستي المتعدد) ، عندما يكون المتغير المعتمد متغير نوعيا يمثل ثنائي الاستجابة اما ان يساوي واحد لحدوث استجابة او صفر لعدم حدوث استجابة ، من خلال استعمال مقدرات المركبات الرئيسية التكرارية(IPCE) التي تعتمد على الاوزان الاعتيادية والاوزان البيزية الشرطية .
اذ تم تطبيق مقدرات هذا ا
... Show MoreThe soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.
In this paper, a new class of sets, namely ï¡- semi-regular closed sets is introduced and studied for topological spaces. This class properly contains the class of semi-ï¡-closed sets and is property contained in the class of pre-semi-closed sets. Also, we introduce and study ï¡srcontinuity and ï¡sr-irresoleteness. We showed that ï¡sr-continuity falls strictly in between semi-ï¡- continuity and pre-semi-continuity.
In this research, a new application has been developed for games by using the generalization of the separation axioms in topology, in particular regular, Sg-regular and SSg- regular spaces. The games under study consist of two players and the victory of the second player depends on the strategy and choice of the first player. Many regularity, Sg, SSg regularity theorems have been proven using this type of game, and many results and illustrative examples have been presented
This paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
The concept of -closedness, a kind of covering property for topological spaces, has already been studied with meticulous care from different angles and via different approaches. In this paper, we continue the said investigation in terms of a different concept viz. grills. The deliberations in the article include certain characterizations and a few necessary conditions for the -closedness of a space, the latter conditions are also shown to be equivalent to -closedness in a - almost regular space. All these and the associated discussions and results are done with grills as the prime supporting tool.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More