The research is trying to identify the investment portfolio risks of the insurance company and their impact, on the Profitability ratios of the company, and whether the company's scientific methods followed in the measurement of these risks, and conducted research in the National Insurance Company. by relying on its annual budget as well as the annual reports, The search dealing with these data in theoretical and practical major premise to statistically significant between to investment portfolio risk and financial performance correlation and reach a set of conclusions and recommendations which are the following.
investments include many ri
... Show MoreThe fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this program. It is a descriptive study and it follows the approach survey method. In this study, the spatial framework is limited to the program of almosamih kareem on YouTube, while the temporal framework is concerned with the episodes that are raised on YouTube from the second half of 2014 to 2015 of almosamih kareem program. The fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this
... Show MoreThe university press is an essential pillar in building an academic community to achieve its objectives in the service of society. Since the university press is a means of university media, which is issued by the departments or units of media in Iraqi universities as academic governmental-institutions, so it highlights the activities of the university and link them to its internal society in the first place as the university press is a mirror of the university and its voice is sincerely expressed. This research comes to know the extent of interest of the university press in various student issues.
In order to identify the problem of the research, the method of content analysis was adopted within the survey method
... Show MoreBackground. The use of modern aids and technology has contributed greatly to football development, the goalkeeper is the most important position in the team, and the use of devices gave objective readings about the goalkeeper's ability in terms of skill and physical aspects. Objectives. The research aimed to prepare exercises using an electronic device to measure the knee bending angle because of its great importance in developing the skill of catching and dimensions of the high ball for football goalkeepers. Methods. The researchers used the experimental method, and the sample consisted of (4) male goalkeepers under 15 years of age, one of the research procedures was to determine the biomechanical variables affecting the development of the
... Show MoreThis Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of r
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More