This research aims to discuss an important issue because of its role in increasing the efficiency of financial markets and boost investor confidence by a insider trading, which arises as a result of leaking secret information to some investors and reliable in the process of trading shares in the Iraq Stock Exchange And thus obtain abnormal profits at the expense of other investors. Research was based on the assumption that " Where shortcomings in local regulations relating to disclosure and insider trading in accounting information leads to the activate the phenomenon of insider trading in accounting information in the Iraq Stock Exchange and including a negative impact on investors' decisions ". and Because of the difficulty the discovery of insider trading activities has been used to measure the change in the volume of trading shares of certain companies before and after the announcement of the meeting and find out the direction of change (increase or decrease). This was done on the three companies. Among the most important findings of this research, is the lack of local laws and regulations from the processors to the phenomenon of insider trading which led to the activate this phenomenon in the Iraq Stock Exchange. The conclusions of the research need to benefit from the experiences of other countries in the formulation of laws on insider trading in accounting information has been
Patients with decompensated cirrhosis have typically prescribed a combination of therapeutic and prophylactic medications. Polypharmacy increases the probability of medication errors and drug related problems. Clinical pharmacists are highly effective at identifying, resolving, and preventing clinically important drug-related problems in their patients' care. The objectives of the study were the identification and classification of drug-related problems, as well as the discussion of these problems with health care providers (physicians, pharmacists, and nurses) and patients. Reduce their incidence as effectively as possible and educate all research participants on the significance of following their prescribed drug regimen
... Show MoreThe latest events in Iraq and notably the fall of Mosul in the summer of 2014 have marked a turning point in The modern history of Iraq. Violent terrorist groups have overrun a vast area comprising of many towns in mid and northern Iraq causing many casualties and mass migration. Despite Iraq’s long history of pain and suffering the events of the second half of the year 2014 have been the most violent ever witnessed. From this point of view the researcher has tried to identify specifically in this time and place the effect these events have had on the Iraqi artist and to understand how the Iraqi artists depicted this violence in their works of art. The research comprises four parts; the first looked at the language used and the and pro
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show Moreإن اختلاف الفقهاء مصدر عظيم لثروة فقهية كبيرة، ومن مظاهر الخلاف الفقهي مؤاخذات علمية يوردها بعض العلماء على علماء آخرين بدعوى مخالفتهم الأدلة الشرعية، أو القواعد المقررة لاستنباط الأحكام الشرعية، ومن تلك المؤاخذات ما أورده الإمام المحدث أبو بكر ابن أبي شيبة رحمه الله تعالى على أبي حنيفة النعمان رحمه الله حيث إنه ساق في مصنفه الكثير من الأحاديث والآثار التي عد الإمام أبا حنيفة رحمه الله مخالفا لما تقتضيه من
... Show MoreBackground: The gene responsible for encoding the protein of cytotoxic T lymphocyte-associated antigen-4 (CTLA-4) has been found to be associated with rheumatoid arthritis (RA) in different ethnic populations. But the association of +49A/G CTLA-4 polymorphism with susceptibility of RA among Iraqi Arab populations has not yet been determined. Methods: One hundred and seventy-eight patients were examined, 67 of them were males (mean age 54.71 ± 10.4 years), while 167 were examined for the control group, of whom 64 were males and the rest were females. CTLA-4 DNA genotyping was carried on to determine the +49 A/G (rs231775) polymorphism using a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP). Enzyme-linked immuno
... Show MoreBackground: Temporomandibular joint (TMJ) is a compound articulation formed from the articular surfaces of the temporal bone and the mandibular condyle.CBCT imaging of TMJ is that it allows accurate measurements of the volume and surface of the condyle. The aim of the study is to assess the sagittal position of mandibular condyle in patients with temporomandibulardysfunction using Cone Beam Computed Tomography in centric occlusion. Materials and Methods: CBCT images for all patients were obtained in an upright position using New Tom Giano CBCT with different field of view (11 x 8), (11 x 5), and (8 x 8) and exposure factors was changed accordingly using NNT version 5.1 software for sagittal reconstruction, anterior, superior and posterior
... Show MoreAn experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the