Malaysia will be an ageing population by 2030 as the number of those aged 60 years and above has increased drastically from 6.2 percent in 2000 and is expected to reach 13.6 percent by 2030. There are many challenges that will be faced due to the ageing population, one of which is the increasing cost of pensions in the future. In view of that, it is necessary to investigate the effect of actuarial assumptions on pension liabilities under the perspective of ageing. To estimate the pension liabilities, the Projected Unit Credit method is used in the study and commutation functions are employed in the process. Demographic risk and salary risk have been identified as major risks in analyzing pension liabilities in this study. The sensitivity analyses will be conducted in the study to investigate how the pension liabilities will be affected when these major risks changes. This study analyzes nine scenarios under assumptions in the actuarial model, namely age of retirement, rate of mortality and rate of salary growth. The result of this study indicates that the implied mortality experience and salary growth rate assumptions have a significant impact on pension liabilities.
Abstract Background: One of the most important methods to replace lost teeth is dental implants. In order to increase the strength of connection of the implant with the jaw bone to provide early loading after placement, implant is coated by different coating materials that achieved that purpose. The aim of this study was to evaluate the influence of coating CP Ti implant with calcium carbonate on the strength of bone-implant interface after two and six weeks of implantation in rabbit femur bone by torque removal test, histological and histomorphometric analysis. Materials and methods: Coating the surface of commercially pure titanium screws with extra pure synthetic calcium carbonate via electrophoretic deposition method (EPD) was done. The
... Show MoreBackground: Ruptured posterior communicating artery (PCoA) aneurysms are common; they usually present with subarachnoid haemorrhage (SAH) and oculomotor nerve palsy. The aneurysmal dome projection may influence the safety access and aneurysmal neck clipping. Here, we discuss additional intraoperative steps that may be required to widen the surgical field to ensure safe surgical clipping of a rupture pure posteriorly directed PCoA aneurysm. Case description: A previously healthy 38-year-old male reported sudden severe headache and disturbed level of consciousness with a Glasgow coma scale (GCS) of 13. His initial computed tomography (CT) scan of the head showed SAH in the basal cistern. 3D-constructed CT angiography (CTA) revealed a
... Show MoreAbstract Background: The daily usage of maxillofacial prostheses causes them to mechanically deteriorate with time. This study was aimed to evaluate the reinforcement of VST50F maxillofacial silicone by using yttrium oxide (Y2O3) nanoparticles (NPs) to resist aging and mechanical deterioration. Materials and Method: Y2O3 NPs (30–45nm) were loaded into VST50F maxillofacial silicone in two weight percentages (1 and 1.5 wt%), which were predetermined in a pilot study as the best rates for improving tear strength with minimum increase in hardness values. A total of 120 specimens were prepared and divided into the control and experimental groups (with 1 and 1.5 wt% Y2O3 addition). Each group included 40 specimens, 10 specimens for each paramet
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.
Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.