This research aims at shedding light on the concept of insurance awareness and clarifying its role on marketing insurance services of a sample of (100) employees in the National Company for Insurance. Questionnaire is used as a main instrument for collecting data and information from the sample. Their answers were analyzed by using arithmetic means, standard deviation, centesimal weight, and the correlation coefficient ( , F, t) tests .The research reached several conclusions of which:1.The sample member's response to insurance awareness and marketing insurance services factors was in the medium level.2.There was a positive relationship of a moral sign between insurance awareness and marketing insurance services, that correlation coefficient reached (0.715).3.There is an effect of moral meaning of insurance awareness in marketing insurance services, the degree is (51%).4.There are no differences of moral sings in the sample answers to show the role of insurance awareness in marketing insurance services according to personal characteristics (age, academic qualifications, number of years in service and administrative level).
KE Sharquie, RA Najim, RK Al-Hayani, AA Al-Nuaimy, DM Maroof, Saudi medical journal, 2008 - Cited by 74
In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show MoreDrilling with casing (DWC) can be considered as a modern drilling technique in which both of drilling and casing operations done in the same time by using the casing to transfer the hydraulic and mechanical power to the bit instead of traditional drilling string. To overcome oil well control, minimizing the total cost through enhancing drilling efficiency, drilling with casing was proposed as an enabling technology.
Two surface sections (17 1/2 - and 12 1/4- inch) were drilled successfully in Rumaila oil field with casing strings which reached 655m and 1524m measured depths respectively.
By using DWC technique, the total drill/case phase time was reduced up to 20% comparing to conventional
... Show MoreAddressed the problem of the research is marked (technical openness in the formation of post-modernism - Pop Art an Example) the nature of the technical expansion of the output artifacts postmodern, and the nature of the raw materials taken as components of its sensual. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. From then select the search goal (revealed openness to hire technical material in the art of Pop Art), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indi
... Show MoreBackground: The Initial (primary) stability is one of the factors that play an important role in the success of the dental implants. The purpose of this study was to evaluate the initial stability of dental implant with horizontal plate by using five analytical tests: insertion torque, removal torque, resonance frequency analysis, push-in test and pull-out test. Materials and methods: Two different lengths of dental implants (5mm and 10mm) were tested in this study; each dental implant was 4mm in diameter with a square threads shape of 1mm pitch and 0.5mm depth. The crestal area was 4.2mm diameter contained a right angle margin circumferential ring while the apical area was tapered with two self-tapping grooves. In this study, the initial s
... Show MoreAn analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More