The research aims to study the basic concepts of the underwriting policy with its various indicators. The researcher studies the underwriting policy with its various indicators (sex, health status, age of the insured, insurance amount, The method of acceptance, payment method, and duration of insurance) where each of these indicators constitute an important factor in the productivity of life insurance policies, where the productivity of life insurance policies face many difficulties because insurance is a service and not a tangible material commodity and its benefits and not current. Therefore, the life insurance company needs to use a prudent underwriting policy so as not to endanger its financial position due to the expansion of the un
... Show MoreThe current study is designed to investigate the histological and immunohistochemical characteristics of the thyroid gland in adult male Sciurus anamalus. This study found that the thyroid gland of the Caucasian squirrel is located in the neck area, below the larynx, on both sides of the trachea. It has two lobes (right and left) with cylindrical shape. The histological studies revealed that the thyroid gland is surrounded by a capsule which consists of connective tissue and forming of two layers which are outer layer and inner layer, and a layer of adipose tissue appears overlapping the outer layer. The inner tissue of the gland consists of follicles with different shapes and sizes, and is lined with simple cuboidal epithelial tissue (foll
... Show MoreAbstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show MoreThe purpose of the study is to synthesize and characterize a new polytriazole derivative from polyacryloyl chloried, first reaction of polyacryloyl chloride with hydrazine hydrate in the presence of DMF as a solvent to obtained acid hydrazide (1) than reacted with different amide to give poly 1,2,4-triazole derivatives(1a-1c). Newly synthesized compounds were characterized by spectral methods [13C-NMR, 1H-NMR, and FTIR] and calculated some of its physical properties. Also, we worked theoretical study involving calculated the geometric configurations, total energy, dipole moment etc..,. In addition, the inhibition effect of the synthesized compounds (1a-1c) on corrosion of stainless steel in 1M HCl were studied by method of weight lo
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreThe tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).
The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?
The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the
... Show More
In the name of God, praise be to God, and prayers and peace be upon the best of God’s creation, Muhammad bin Abdullah, and upon his family and companions, and from his family:
And after:
He saw from verbs that transcend one effect if it is visual and to two effects if it is heart and this action has several strokes and it is an awareness of the sense and illusion and imagination and reason and in addition to that it has many meanings dealt with in the glossary books and as for what the verb included in the audio studies it is the explanation and deletion and slurring The heart of my place. As for what the grammatical studies included, it focuses on one or two effects according to its l
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More