The research aims to develop the general performance and improve the level of activity of private insurance companies in line with the current progress of the country. Besides, Evaluating financial performance to diagnose weaknesses and strengths in sample research companies and then developing appropriate solutions. The deviation in the financial performance of the research sample was revealed by measuring the various accounts of the company. The research sample included five companies in the private insurance sector listed in the Iraqi Stock Exchange Market, which represent the private insurance sector. The research concluded that the added economic value is a broad concept that goes beyond the traditional performance evaluation process and is based on compound costs related to the cost of debt, the weighted average cost of capital and the profits realized. The insurance sector witnessed the achievement of the added economic value. The results of the research show a great interest from the side of the management of companies in this concept; these results show as well that some of these companies have neglected the concept of the added economic value. The most outstanding recommendation is that all the financial and economic sectors are required to pay attention to the added economic value as a comprehensive performance of the company and a scale to compete, which is achieved through the compound costs of the calculation of the added economic value, which is a process that goes beyond the traditional evaluation process.
The extraction, study, and accurate interpretation of the morphology database of a basin are the basic blocks for building a valid geomorphological understanding of this basin. In this work, a new approach is presented which is to use three different GIS based methods to extract databases with specific geographical information and then use the concept of information intersection to make a realistic geomorphological perspective for the study area.
In the first method, data integration of remote sensing images from Google Map and SRTM DEM images were used to identify Horan basin borders.
In the second method, the principle of data integration was represented by extracting the quantitative values of the morphometric c
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreCopper Zinc Sulphide (Cu0.5Zn0.5S) alloy and thin films were fabricated in a vacuum. Nano crystallized (CZS) film with thick 450±20 nm was deposit at substrates glasses using thermal evaporation technique below ~ 2 × 10− 5 mbar vacuum to investigated the films structural, morphological and optical properties depended on annealing temperatures ( as-deposited, 423, 523 and 623) K for one hour. The influences annealed temperature on structurally besides morphologically characteristics on these films were investigated using XRD and AFM respectively. XRD confirms the formation a mixed hexagonal phase of CuS-ZnS in (102) direction with polycrystalline in nature having very fine crystallites size varying from (5.5-13.09) nm. AFM analys
... Show MoreIn the present work, pattern recognition is carried out by the contrast and relative variance of clouds. The K-mean clustering process is then applied to classify the cloud type; also, texture analysis being adopted to extract the textural features and using them in cloud classification process. The test image used in the classification process is the Meteosat-7 image for the D3 region.The K-mean method is adopted as an unsupervised classification. This method depends on the initial chosen seeds of cluster. Since, the initial seeds are chosen randomly, the user supply a set of means, or cluster centers in the n-dimensional space.The K-mean cluster has been applied on two bands (IR2 band) and (water vapour band).The textural analysis is used
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreThe present work covers the analytical design process of three dimensional (3-D) hip joint prosthesis with numerical fatigue stress analysis. The analytical generation equations describing the different stem constructive parts (ball, neck, tour, cone, lower ball) have been presented to reform the stem model in a mathematical feature. The generated surface has been introduced to FE solver (Ansys version 11) in order to simulate the induced dynamic stresses and investigate the effect of every design parameter (ball radius, angle of neck, radius of neck, neck ratio, main tour radius, and outer tour radius) on the max. equivalent stresses for hip prosthesis made from titanium alloy. The dynamic loading case has been studied to a stumbling ca
... Show MoreIn this paper, the series solutions of a non-linear delay integral equations are considered by a modified approach of homotopy analysis method (MAHAM). We split the function into infinite sums. The outcomes of the illustrated examples are included to confirm the accuracy and efficiency of the MAHAM. The exact solution can be obtained using special values of the convergence parameter.
Many studies revealed that Chlamydia trachomatis is the most prevalent bacteria “that cause sexually transmitted infections in the world.. Most of these infections are asymptomatic and there is a remarkable relationship between CT infections and male infertility. Therefore, “the present study is established to determine the effect of Chlamydia trachomatis infection on seminal fluid quality in males suffering from infertility compared with fertile males.. “Semen samples were collected from 63 infertile male and 13 fertile male as control group, attending the clinical laboratory for routine seminal fluid analysis. Seminal fluid was analyzed according to World Health Organization guidelines, the whole geno
... Show MoreThe present work aims to evaluate the content of some toxic metals in chemical and organic fertilizers purchased from local markets in Baghdad, Iraq. The analysis was performed by laser-induced breakdown spectroscopy (LIBS) system. The emission spectral lines of lead (Pb), chromium (Cr), cadmium (Cd) and cobalt (Co) have been recorded to determine the best peak representing each element according to the NIST database. The validity of the LIBS procedure was checked by cross-validating the obtained results using atomic absorption spectroscopy (AAS) with a maximum relative error of 5.3%. Moreover, for qualitative analysis, Pb I 296.64 nm emission line was determined to be superior for the evaluation of lead content in terms of three
... Show MoreThe analysis of the hyperlink structure of the web has led to significant improvements in web information retrieval. This survey study evaluates and analyzes relevant research publications on link analysis in web information retrieval utilizing diverse methods. These factors include the research year, the aims of the research article, the algorithms utilized to complete their study, and the findings received after using the algorithms. The findings revealed that Page Rank, Weighted Page Rank, and Weighted Page Content Rank are extensively employed by academics to properly analyze hyperlinks in web information retrieval. Finally, this paper analyzes the previous studies.