IFRS 17 aims to provide a unified basis for accounting for all types of insurance contracts, including reinsurance contracts, in a manner that benefits both investors and insurance companies and enhances the ability of the financial statements of insurance companies for comparison between companies listed in financial markets around the world. According to this standard, insurance contracts are accounted for on the basis of the Asset-Liability Approach and the use of fair values that the standard requires updating regularly in order to provide more useful information to the users of financial statements, as a result of the failure of reporting requirements for insurance contr
... Show MoreIn the Rumaila oilfields in southern Iraq, the Zubair Formation was deposited in a shallow environment as three main facies, delta plain, backshore, and delta front depositional conditions indicating a transition from delta front and delta plain to a highstand level due to the finning upward mode. The facies of the Zubair clasts show well-sorted quartz arenite sandstone, poorly sorted quartz arenite sandstone, clayey sandstone that has not been properly sorted, sandy shale, and shale lithofacies. The minor lithofacies were identified using well-logging methods (gamma ray, spontaneous potential and sonic logs) and petrography. The Zubair clasts are of transition environment that appears to be transported from freshwater and deposited
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreActivity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreIdentifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit
... Show MoreResearch summary
Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.
Islam laid down moral principles in war, including:
- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.
- Not to be exposed to non-combatants, including women, boys, the elderly, the disa
... Show MoreThe use of destructive weapons in wars without restrictions and controls, which eat green and dry land, pollute the environment and cause genocide, has become the problem of the times.
International conventions for the protection of the environment during armed conflicts are characterized by generality, ambiguity, and open to interpretation by the participating states in the agreement, and each state interprets these texts to serve its interests, but the Islamic Sharia stipulates the prohibition of the use of these comprehensive destructive weapons in an unambiguous manner, As stated in the Holy Quran:
... Show MoreThe research aims at identifying the organizational performance of the kindergarten teachers and defines the educational environment of kindergarten children. To achieve the objectives of the research, the researcher adopted the organizational performance scale for (Saadi, 2016), which was applied to kindergarten teachers. The scale consists of (43) paragraphs, and has good reliability and validity, as the coefficient of reliability (84.0) in a retest method, and (87.0) using the formula Alpha Kronbach. Additionally, the researcher adopted the educational environment scale for (Radam, 2015); the scale consists of (66) paragraphs, and it enjoys a good reliability and validity, as the coefficient of reliability (89.0) method of reliability
... Show More