Preferred Language
Articles
/
xxeD2ZIBVTCNdQwC3cHV
Exclusion optimal portfolio from outlier by using fuzzy c-means clustering - analytical research at the Iraqi Stock Exchange
...Show More Authors

This research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio building models to diagnose those stock that Causing a decrease in portfolio performance ,our conclusion is Clustering technic outperforms the diagnosis of those stocks that meet the condition of opting into the optimal portfolio according to common considerations, but after excluding them, the performance of optimal portfolio is rises

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
Ruling on conducting a marriage contract through modern means of communication Juristic study
...Show More Authors

 

This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.

It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values ​​and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Cech Fuzzy Soft Bi-Closure Spaces
...Show More Authors
Abstract<p>In the present study, Čech fuzzy soft bi-closure spaces (Čfs bi-csp’s) are defined. The basic properties of Čfs bi-csp’s are studied such as we show from each Čfs bi-csp’s (<italic>u, L<sub>1</sub>, L<sub>2</sub>, S</italic>) we can obtain two types of associative fuzzy soft topological spaces, the first is a fuzzy soft bitopological space (<italic>U, τ<sub>L<sub>1</sub> </sub>, τ<sub>L<sub>2</sub> </sub>, S</italic>) and the second is a fuzzy soft topological space (<italic>U, τ<sub>L<sub>1</sub> </sub> </italic></p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Robust Estimation For Location Parameter
...Show More Authors

 In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Bipolar fuzzy ideals of TM-algebras
...Show More Authors

The concept of bipolar fuzzy ideals in a TM-algebra was introduced and some properties of these ideals are investigated. Also, a few relations between a bipolar fuzzy ideal and T-ideal are discussed. A new bipolar fuzzy set with a homomorphism of TM-algebra is defined. The Cartesian product of bipolar fuzzy T-ideals in Cartesian product TM-algebras is given.

View Publication
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
On Almost Quasi-Frobenius Fuzzy Rings
...Show More Authors

In this paper, we introduce the concept of almost Quasi-Frobcnius fuzzy ring as a " " of Quasi-Frobenius ring. We give some properties about this concept with qoutient fuzzy ring. Also, we study the fuzzy external direct sum of fuzzy rings.

View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Nternational Journal Of Mathematics Trends And Technology (ijmtt)
Fuzzy Scheduling Problem on Two Machines
...Show More Authors

Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using the Sherrod model in predicting financial failure in Iraqi private banks: an applied study in the Iraqi commercial and Iraqi Islamic banks
...Show More Authors

Abstract:

              The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year   . The research examines the use of

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Interactivity of iraqi daily newspapers sites an analytical study of the websites of al-mada,al-zaman.al-sabahand tareqal-shaab newspapers
...Show More Authors

A study of interactivity in the Iraqi newspaper sites_ An analytical study of the website of Al-Mada, Al-Zaman, Al-Sabah and Tariq Al-Shaab newspaper sought to determine the amount of interactivity in the sites of Iraqi newspapers that have been published since 2003, which consists of (15) newspapers according to the statistics of the Iraqi Books and Documents House.

and the researcher conducted an analytical survey on these sites, and the percentage of interactivity in general was weak, not more than (47.1%), and this weakness in interactivity contributed greatly to the decline in surfers of the websites of those electronic newspapers.

The highest aggregate rate of the research sample was in the simple interactive tools

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Practice of Continuous Auditing in accordance with Technology Acceptance Model: An analytical study of a sample of the Iraqi auditing Offices
...Show More Authors

Abstract

This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref