The current research focuses on a major problem: the weak role of disclosing corporate information in the application of laws, regulations and instructions related to the application of corporate governance principles weakens the ability to protect the rights of shareholders and investors in companies listed on the Iraqi Stock Exchange and the study aims to study and analyze the role of disclosure and transparency in achieving the necessary protection to ensure the rights of shareholders. The study was applied to a sample of (42) analysis samples representing (84%) of the total questionnaires distributed to investors and shareholders in all listed companies in the Iraqi Stock Exchange. The results confirm the shareholder's right to obtain guaranteed methods for recording, transferring and transferring ownership of shares, as well as obtaining material and relevant information on a timely basis on a regular basis; participation and voting in the of shareholders; election and removal of board members; The information resulting from the decisions concerning the amendment of the rules of procedure, the memorandum of association or the issuance of the additional shares, or all that leads to the sale of the company. The most important recommendation is the need to oblige companies to prepare quarterly and semi-annual financial reports in addition to the annual reports.
Our aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule of an -module is called nearly primary-2-absorbing submodule if whenever , for , , , implies that either or or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.
Let R be commutative Ring , and let T be unitary left .In this paper ,WAPP-quasi prime submodules are introduced as new generalization of Weakly quasi prime submodules , where proper submodule C of an R-module T is called WAPP –quasi prime submodule of T, if whenever 0≠rstϵC, for r, s ϵR , t ϵT, implies that either r tϵ C +soc or s tϵC +soc .Many examples of characterizations and basic properties are given . Furthermore several characterizations of WAPP-quasi prime submodules in the class of multiplication modules are established.
In this article, unless otherwise established, all rings are commutative with identity and all modules are unitary left R-module. We offer this concept of WN-prime as new generalization of weakly prime submodules. Some basic properties of weakly nearly prime submodules are given. Many characterizations, examples of this concept are stablished.
Purpose: The purpose of this study was to clarify the basic dimensions, which seeks to indestructible scenarios practices within the organization, as a final result from the use of this philosophy.
Methodology: The methodology that focuses adoption researchers to study survey of major literature that dealt with this subject in order to provide a conceptual theoretical conception of scenarios theory .
The most prominent findings: The only successful formulation of scenarios, when you reach the decision-maker's mind wa takes aim to form a correct mental models, which appear in the expansion of Perception managers, and adopted as the basis of the decisions taken. The strength l
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreGangyong Lee, S.Tariq Rizvi, and Cosmin S.Roman studied Rickart modules.
The main purpose of this paper is to develop the properties of Rickart modules .
We prove that each injective and prime module is a Rickart module. And we give characterizations of some kind of rings in term of Rickart modules.
In this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.
In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.
The presented work includes the Homotopy Transforms of Analysis Method (HTAM). By this method, the approximate solution of nonlinear Navier- Stokes equations of fractional order derivative was obtained. The Caputo's derivative was used in the proposed method. The desired solution was calculated by using the convergent power series to the components. The obtained results are demonstrated by comparison with the results of Adomain decomposition method, Homotopy Analysis method and exact solution, as explained in examples (4.1) and (4.2). The comparison shows that the used method is powerful and efficient.