This research aims to discuss an important issue because of its role in increasing the efficiency of financial markets and boost investor confidence by a insider trading, which arises as a result of leaking secret information to some investors and reliable in the process of trading shares in the Iraq Stock Exchange And thus obtain abnormal profits at the expense of other investors. Research was based on the assumption that " Where shortcomings in local regulations relating to disclosure and insider trading in accounting information leads to the activate the phenomenon of insider trading in accounting information in the Iraq Stock Exchange and including a negative impact on investors' decisions ". and Because of the difficulty the discovery of insider trading activities has been used to measure the change in the volume of trading shares of certain companies before and after the announcement of the meeting and find out the direction of change (increase or decrease). This was done on the three companies. Among the most important findings of this research, is the lack of local laws and regulations from the processors to the phenomenon of insider trading which led to the activate this phenomenon in the Iraq Stock Exchange. The conclusions of the research need to benefit from the experiences of other countries in the formulation of laws on insider trading in accounting information has been
Background: The change in the concepts of cavity preparation and the development of reliable adhesive materials lead to the development of alternative methods of caries removal. Chemo-mechanical caries removal (CMCR) involves the chemical softening of carious dentin, followed by its removal with manual excavation. The present study was conducted to evaluate clinically the efficiency of caries removal using a new chemo-mechanical agent (Papacarie) compared to the conventional drilling method in reduction of total bacterial count. Material and methods: The study is a split mouth design. The sample composes from sixty mandibular deciduous molars teeth in thirty children, between six to nine years of age with bilateral class I deep occlusal car
... Show MorePatients with decompensated cirrhosis have typically prescribed a combination of therapeutic and prophylactic medications. Polypharmacy increases the probability of medication errors and drug related problems. Clinical pharmacists are highly effective at identifying, resolving, and preventing clinically important drug-related problems in their patients' care. The objectives of the study were the identification and classification of drug-related problems, as well as the discussion of these problems with health care providers (physicians, pharmacists, and nurses) and patients. Reduce their incidence as effectively as possible and educate all research participants on the significance of following their prescribed drug regimen
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: study the effect of various risk factors on reperfusion success after thrombolysis by measuring ST resolution.
Objectives: Early patency of the infarct-related artery is associated with reduced mortality. Thrombolytic therapy is frequently followed by rapid recanalization lead to reduction of infarct size, improve left ventricular function and increase survival by reopening of coronary artery . The reduction in ST-segment elevation on the standard 12 lead electrocardiogram 1-4 h after initiation of thrombolysis may be the simplest and most useful clinical tool to test the effectiveness of thrombolytic therapy.
Methods: Seventy patients with acute ST elevation myocardial infarction admitted to alkindy teaching hospital C
This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the
... Show MoreThe study included the description of external body parts and the male genitalia for the male of rusty flour beetle Tribolium castaneum (Herbst,1797) and the studied was supported by illustrations
Represent the current study and tagged (the credibility of digital image and its reflection on the process of cognitive picture releases) scientific effort is designed to detect realizing press releases and the extent affected the credibility of the digital image by selecting the relationship between digital photo and the extent of their credibility on the one hand and between the process of cognition and Press Photo of the hand Other than the consequent establishment researcher collects materials to serve the scientific research topic in three chaptersCombine the first one methodological framework for the search of the research problem and its significance and the desired objective be achieved together with the definition of the most im
... Show Moreis divided into two chapter:Chapter one to ensure asyslematic framework for research amd included aresearch problem and also inchuded on the importance of research and the need for him as well as to clarify. The second chapter inchuded a theoretical framework: theoretical framework has been divided into two section. The first topic: poetics transformations The second topic: poetics and scale of rheloric in the film After the comp of the theoretical framework; so the researcher analyzed the film (Antichrist) has arrived ataset of resuits was including