This research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio building models to diagnose those stock that Causing a decrease in portfolio performance ,our conclusion is Clustering technic outperforms the diagnosis of those stocks that meet the condition of opting into the optimal portfolio according to common considerations, but after excluding them, the performance of optimal portfolio is rises
The study aims to identify the effectiveness of a structural theory-based training program in enhancing the teaching practices of Arabic language teachers teaching grade ten in South Al Batinah in Sultanate of Oman. The study used the quasi-experimental design, and the sample consisted of 40 male and female teachers. To achieve the objectives of the study, a training program, an observation form and a measurement tool of teachers’ tendencies towards a structural teaching were made. The program was implemented with an experimental group of 20 female and male teachers in the first semester of the academic year 2018/2019. The study has found that there is a statistically significant difference between the average grades before and after i
... Show MoreThe research aims to identify the future teachers' attitudes toward cloud computing in the Kingdom of Saudi Arabia from their point of view. The research adopted the descriptive approach, and a questionnaire was applied to a random sample of (370) male and female teachers in governmental and private general education schools in the Al-Jouf region, Saudi Arabia. The results of the research concluded that the reality of future teachers' attitudes towards cloud computing in the Kingdom of Saudi Arabia from their point of view is very high and that most areas of using computing are in the field of assessment, then teaching, and activities. The challenges of future teachers' attitudes toward cloud computing are recorded at a high level, parti
... Show MoreBackground: Hypothyroidism is a decrease in the production of the thyroid hormones and leads to gland dysfunction. Ashwagandha extract was used as an ayurvedic treatment and supposed to be as antihypothyroidism agent.
Objectives: to investigate the impact of ashwagandha (Ash) extract on propylthiouracil (PTU)-induced hypothyroidism in rats.
Subjects and Methods: The rats were divided into three groups, control group, PTU (hypothyroid) group (6mg/kg/day by oral route), PTU (6mg/kg/day by oral route) +Ash (50mg/kg/day by oral route) treated group. All treatment continued for
... Show MoreThis work is devoted to a comparative study of the phenomenon of enantiosemy in Russian and Arabic.Everyone knows the term antonyms - words of the same part of speech, opposite in meaning, such as: Day and night, white and black, truth and lies. But in Russian, Arabic and other languages there is an interesting phenomenon, which consists in the fact that one word has two opposite meanings. Such a phenomenon in linguistics is called enantiosemy (from the Greek words enantios - "opposite" and sema - "sign")
The aims of this study the infection with parasites Entamoeba histolytica and Giardia lamblia and prevalence rates and their relationship with gende , age group , the number of family members and source of drinking water among the patients at attending the Bint Al Huda and Al- Hussin Teaching hospital in Nassriyia city in Thi- Qar province , it was noticed that the percentage of parasitic infection at females was 38.55% and at males was 61.45% and the percentage of parasitic infection with Entamoeba histolytica 97% was higher than the percentage of parasitic infection with Giardia lamblia 3%,and the reduction of percentage of infection is associated with increasing of the number of family member ,the percentage of infection was 49% at the
... Show MoreIntrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show MoreThe emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show More