The research aims to determine the effectiveness of auditing in light of the relationship between the governance of investment policy and the cost of debt in companies listed on the Iraqi Stock Exchange. The problem of the research is to raise the question about the effect of the governance of investment policy and the cost of debt on the effectiveness of auditing and auditors. During the research, the most important of them were: the existence of an impact relationship on the effectiveness of auditing through the relationship between the governance of investment policy and the cost of debt. The companies listed in the Iraqi Stock Exchange lack an effective proposed guide or framework dealing with the governance of investment policy despite the presence of laws and regulations to protect investors and shareholders, but they did not It is applied if it may affect the desire of stakeholders to invest in these companies. The most important recommendations reached by the research were: Urging the application of the mechanisms and principles of corporate governance and the governance of investment policy by working to educate the community about it, and that its application is considered a safety against conflict of interest and fraud and protection their interests, and also recommended the necessity of forming specialized committees with expertise to formulate principles for the governance of investment policy that suit the Iraqi environment In accordance with the principles issued by the OECD Development Organization, and preparing a guide or a proposed audit framework that includes the principles of governance and the governance of investment policy or the cost of borrowing, including the audit procedures that the auditor must perform to ensure the application of governance and its impact on the continuity of work in the economic unit.
The aim of this study is to determine and evaluate the units and subunits of Mishrif Formation in Garraf oil field 85 km north of Nasiriyah city depending mainly on the geophysical well logging data and other amiable geological information. The sets of the geophysical well logs data acquired from GA-4, GA- AIP, GA- B8P, GA-3 and GA-5 wells of Garraf oil field are used to determine the petrophysical and lithological properties for each zone in Mishrif Formation to locate, define and evaluate hydrocarbon production from each zone in the reservoir which is also known as formation evaluation. The digitization was done by using Didger software and the interpretations were made using Interactive Petrophysics Program v 3.5 and Petrel software.
... Show MoreBabesiosis is a tick-borne disease caused by Babesia microti. We present a case of false positive HIV in the setting of confirmed babesiosis infection. An understanding that patients with babesiosis can have a false positive HIV test result is important in management decisions.
Violence occurs as a daily human action all over the world; it may cause so many kinds of damage to individuals as well as to society: physical, psychological, or both. Many literary authors of different genres have tried their best to portray violence by showing its negative effects, especially playwrights because they have the chance to show people the dangers of violence through performance on stage to warn them against such negatively affected action. It has been a human action since the beginning of human life on this planet when the first crime happened on earth when Cane killed his brother Abel. In our modern world, people are witnessing daily violent actions as a result of destructive wars that turned the humans into brutal beings.
... Show MoreIn 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.
Establishing complete and reliable coverage for a long time-span is a crucial issue in densely surveillance wireless sensor networks (WSNs). Many scheduling algorithms have been proposed to model the problem as a maximum disjoint set covers (DSC) problem. The goal of DSC based algorithms is to schedule sensors into several disjoint subsets. One subset is assigned to be active, whereas, all remaining subsets are set to sleep. An extension to the maximum disjoint set covers problem has also been addressed in literature to allow for more advance sensors to adjust their sensing range. The problem, then, is extended to finding maximum number of overlapped set covers. Unlike all related works which concern with the disc sensing model, the cont
... Show MoreTransient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure sinusoidal amplitude range and
... Show MoreMixed convection heat transfer in a vertical concentric annulus packed with a metallic porous media and heated at a constant heat flux is experimentally investigated with water as the working fluid. A series of experiments have been carried out with a Rayleigh number range from Ra=122418.92 to 372579.31 and Reynolds number that based on the particles diameter of Red=14.62, 19.48 and 24.36. Under steady state condition, the measured data were collected and analyzed. Results show that the wall surface temperatures are affected by the imposed heat flux variation and Reynolds number variation. The variation of the local heat transfer coefficient and the mean Nusselt number are presented and analyzed. An empirical
... Show MoreSurface Plasmon Resonance (SPR)-based plastic optical fiber sensor for estimating the concentration and refractive index of sugar in human blood serum. The sensor is fabricated by a small part (10mm) of optical fiber in the middle is embedded in a resin block and then the polishing process is done, after that it is deposited with about (40nm) thickness of gold metal. The blood serum is placed on gold coated core of an Optical grade plastic optical fiber of 980 µm core diameter.
This research is an attempt to study aspects of syntactic deviation in AbdulWahhab Al-Bayyati with reference to English. It reviews this phenomenon from an extra-linguistic viewpoint. It adopts a functional approach depending on the stipulates of systemic Functional Grammar as developed by M.A.K. Halliday and others adopting this approach. Within related perspective, fairly’s taxonomy (1975) has been chosen to analyze the types of syntactic deviation because it has been found suitable and relevant to describe this phenomenon. The research hypothesizes that syntactic deviation is pervasive in Arabic poetry, in general and in Abdul-Wahhab Al-Bayyati Poetry in specific, and can be analyzed in the light of systemic Functional Grammar
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show More