The research aims to show the possibility of adopting the market approach to measure the fair value of biological assets in Iraq, by applying to a sample of the company listed on the Iraq Stock Exchange, where the Middle East Fish Production and Marketing Company was selected from among 7 companies representing the agricultural sector in Iraq, and according to the availability of data and for five years, the financial statements were presented of the measurement and disclosure of biological assets at fair value according to the market approach, One of the most important conclusions reached by the researcher is the The possibility of measuring and disclosing biological assets at fair value according to the market approach in the Iraqi agricultural economic units based on the data of the Central Bureau of Statistics, while the most prominent recommendations reached by the researcher were the development of methods of measuring fair value in the Iraqi market and the adoption of the market approach as it suits the Iraqi environment.
Limited importance of research in a stand on the most important difficulties faced by both faculty and parents to communicate with each process to follow up on their children, and the analysis and inventory of the obstacles that hinder the educational process, and work to develop a vision of how to address these constraints and the important role of technology in the treatment of problems of the society so as to develop frameworks future to minimize the errors and the problems they face, and the development outlook for future generations in order to promote the educational level, especially that Iraq is going through a change in conditions in all sectors. Through the questionnaire, which includes questions set that was made on a sample o
... Show Moreالاستثمار الاجنبي المباشر في العراق ودوره في تحقيق التنمية الاقتصادية
This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreThe research problem boils question is there in Riyadh organizational climate that enables them to do their work properly and whether there are differences between the government and private Riyadh depending on the organizational climate has sought Find measure: 1 regulatory climate for kindergarten 2. The difference between government and private Riyadh depending on the organizational climate. Limited research on the (200) parameter of the Riyadh government and private parameters for the year (20,142,015) In order to achieve the research objectives the researchers built a regulatory climate in accordance with the scientific steps to build a psychological scales measure After the formulation of climate regulation paragraphs of the (30) p
... Show More
Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos
... Show MoreCompanies need to educate people about the facts that characterize the business. This is the mission of promotion, it is an important marketing activity, promotion communicates with others and seeks to provide customers with a new business process experience.
Advertising is the most important methods of promotion and the best way to reach an audience. Once the organization advertises its products and services, it can operate in a competitive environment. Marketing competition requires knowledge of humanity that must be affected and convinced. Advertising should create Desires and need for satisfaction. This research comes in the study of visual representations of this psychological incident and how to use it communicatively to create
Parties as active units in this process in order to work must have access to sources of funding in order to maintain their political presence in society and participate in the process of electoral competition, To win the election, bolstering the huge role that money has played in influencing the principle of equality among contestants in the elections. Those who own money will have a greater chance of winning the elections while less competitive opportunities for others who do not own the money or what they own does not give them the competitive ability to win elections. From this point of view, controlling political finance through legal regulation and institutional, media and popular monitoring has become an important requirement
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show More