This research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio building models to diagnose those stock that Causing a decrease in portfolio performance ,our conclusion is Clustering technic outperforms the diagnosis of those stocks that meet the condition of opting into the optimal portfolio according to common considerations, but after excluding them, the performance of optimal portfolio is rises
Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreIn this research, we sought to identify the nature of the relationship between the exchange rate of the Chinese yuan and the value of Chinese exports, through the formulation of a standard model based on the model of common integration, and based on the data of the study and using the test "Angel-Granger" It reflects the relationship between the two research variables, through which the relationship between the RMB exchange rate and the value of Chinese exports was estimated during the period 1978-2017.
Interleukin -33 is a new member of the IL-1 superfamily of cytokines that is expressed mainly by stromal cells.Its expression is upregulated following pro-inflammatory stimulation.Aim of the present study was to assess the serum IL-33 level and its relationship with inflammatory biomarker CRP in Iraqi females patients with celiac disease. Thirty five patients with celiac disease (CD) and thirty healthy individuals as control group were enrolled in this study,their age ranged (20-35) year.Anti-Gliadin IgA ,IgG and Anti-Tissue IgA ,IgG were estimated in all subjects as diagnostic parameters .ESR and CRP were assayed as inflammatory biomarkers. IL-33 was determined in patients and control groups.The results of the present study revealed a hig
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper , two method which deal with finding the optimal value for adaptive smoothing constant, are compared .This constant is used in adaptive Single Exponential Smoothing (ASES).
The comparing is between a method uses time domain and another uses frequency domain when the data contain outlier value for autoregressive model of order one AR(1) , or Markov Model, when the time series are stationary and non stationary with deferent samples .
Two groups of chronic hepatitis B and C virus patients were divided into Pre-treated patients (25 CHB patients with positive HBs Ag for more than 6 months and 40 CHC patients), and post-treated patients [12 CHB patients (4, 6, and 2 were treated with lamivudine, IFN-? and combination of LMV + IFN-? respectively), and 27 patients for CHC (3, 13 and 11 patients were treated with Ribavirin, IFN-? and combination therapy (RBV+ IFN-?) respectively].These patients were followed up for 6 months. By using ELISA technique, levels of IL-6, IL-10, IFN-? and TNF-? were measured in vivo and in vitro (supernatant of PBMCs stimulated with PHA) and compared with healthy control. The mean level of IL-6, IL-10 and TNF-? in CHB patients showed significant dif
... Show MoreThe research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show More
