The current research focuses on a major problem: the weak role of disclosing corporate information in the application of laws, regulations and instructions related to the application of corporate governance principles weakens the ability to protect the rights of shareholders and investors in companies listed on the Iraqi Stock Exchange and the study aims to study and analyze the role of disclosure and transparency in achieving the necessary protection to ensure the rights of shareholders. The study was applied to a sample of (42) analysis samples representing (84%) of the total questionnaires distributed to investors and shareholders in all listed companies in the Iraqi Stock Exchange. The results confirm the shareholder's right to obtai
... Show MoreThe identification of salinity-tolerance genes is a critical aspect of the new molecular technology. In this work cDNA-RAPD is used for the identification of genes expressed in salt tolerant but not in salt sensitive wheat. Two cultivars wheat, salt tolerance (Dijla) and sensitive (Tamooz2) were used for the preparation of RNA and cDNA synthesis. Eight primers were used for random amplification of cDNA constructed from RNA and three primers were differentially expressed in salt tolerant cultivars. Genes related to salt tolerant were predicted using NCBI blast for the three primers. The predicted genes were involved in salt tolerance of wheat and other plants as well. This indicates the suitability of the primers and the method for
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreBy using precipitation polymerization, liquid electrodes of polymers imprinted with Mebeverine hydrochloride and metronidazole benzoate were created whereas the imprinted polymer (MIP) and non imprinted (NIP) polymers were prepared by using Mebeverine hydrochloride and Metronidazole benzoate qua a template. In the polymerization process, 2-Acrylamido-2-methyl-1-propane Sulphonic acid (AMPS) or 1-Vinylimidazole (VIZ) was used qua monomer, pentaerythritol triacrylate (PETRA) or Divinylbanzene (DVB) was used qua a cross-linker while benzoyl peroxide (BPO) was used as an initiator. The MIP membranes and the membranes of NIP were created by using Dibutyl Sebacate (DBS) and Tris(2-ethylhexyl)phosphate(TEHP) qua plasticizers
... Show More