Malaysia will be an ageing population by 2030 as the number of those aged 60 years and above has increased drastically from 6.2 percent in 2000 and is expected to reach 13.6 percent by 2030. There are many challenges that will be faced due to the ageing population, one of which is the increasing cost of pensions in the future. In view of that, it is necessary to investigate the effect of actuarial assumptions on pension liabilities under the perspective of ageing. To estimate the pension liabilities, the Projected Unit Credit method is used in the study and commutation functions are employed in the process. Demographic risk and salary risk have been identified as major risks in analyzing pension liabilities in this study. The sensitivity
... Show More
Research summary
Backbiting pronouns have gained great importance in contemporary textual linguistic studies, as they play a coordinating function in the text and link its parts.
Interpreters did not overlook the role of backbiting pronouns in achieving the function of consistency and coherence in the Qur’anic text, as they referred to this, including Ibn Ashour, who had many analytical practices related to referral issues and their complexities. The Qur'anic reference to the pronouns of backbiting, so the researcher traced these phenomena and their evidence in the Holy Qur'an, aiming to clarify their role in enriching the significance and in the coherence and harmony
... Show MoreThe current research dealt with (the deliberative dimension of the visual sign in the contemporary Iraqi poster) in an attempt to identify the importance of the contemporary poster and the role of the international dimension of the visual sign of exceptional importance.
What is the international dimension of the visual mark?
- What is the effect of the visual label on the contemporary Iraqi poster?
The current research aims to identify the pragmatic dimension in the contemporary Iraqi poster.
Across the temporal and spatial research boundaries of the year (2000-2020) in Iraq. The limits of the objective research The limits of this study on the pragmatics in the visual sign and the determination of the relationship betwee
Background: Studies show that diabetic patients have a higher incidence of ischemic stroke than non-diabetic patients. In the Framingham study the incidence of thrombotic stroke was 25 times higher in diabetic men and 36 times higher in diabetic women than in those without diabetes
Objectives: aim of this study to analyze topography in diabetic patients.
Type of study: Cross sectional study.
Methods: 48 patients with acute stroke were classified into 4 groups: euglycemic, stress hyperglycemia, newly diagnosed diabetics, and known diabetics.
Results:no significant differences were found in the type, site or size of st
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More