Companies seek to enhance investor confidence by achieving the highest level of transparency in disclosure of financial and non-financial information (SASB standards) for Iraqi insurance companies listed on the financial market. The aim of the research is to identify the extent of the ability of financial and non-financial information to enhance transparency in reporting, which is reflected in Investor confidence. And the standards of sustainability development accounting issued by (SASB) through the electronic questionnaire that was distributed. Companies seek to achieve a set of goals, the most important of which is to enhance investor confidence by improving transparency in disclosure. Concerning the employment of financial and non-financial information (SASB standards), the results were obtained by analyzing the results of individuals ’answers using the outputs of the SPSS program, as it was found that the disclosure of sustainability accounting standards (SASB standards) insurance standard (FNO301) and indicators of transparency in reporting issued by the institution (S&P) Contributes to enhancing investor confidence.
To fabricate an inexpensive surface coating with excellent mechanical properties with good water resistance and thermal diffusion, white eggshell fibers with particle size (~1micrometer) has been added by different weight percentages (1,2,3,4,5,6,7 and 8 %) to Unsaturated Polyester.
The weight ratio (4%) of eggshell powder is a good ratio to be added to polyester to improve its mechanical properties, such as hardness, impact strength, and wear resistance. The hardness was improved by (3.75%); impact strength has the same value as polyester, flexural strength by (8.43%) and high improvement in wear resistance (74.4%), as well as to get further improvements in mechanical properties of polyester, the eggshell powder was added
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
Background: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c
... Show MoreLet R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreCloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreIn this study, the electron energy distribution function (EEDF), the electron swarm parameters , the effective ionization coefficients, and the critical field strength (dielectric strength) in binary He-H2 gas mixture which is used as cryogenic for high-temperature superconducting power applications, are evaluated using two-term solution of the Boltzmann equation over the range of E/N ( the electric field to gas density) from 1 to 100 Td ( 1 Td=10-17 Vcm2) at temperature 77 K and pressure 2MPa, taking into account elastic ( momentum transfer) and inelastic cross-sections. Using the electron energy distribution function (EEDF) electron swarm parameters (electron drift velocity, mean electron e
... Show MoreThe inverse kinematic equation for a robot is very important to the control robot’s motion and position. The solving of this equation is complex for the rigid robot due to the dependency of this equation on the joint configuration and structure of robot link. In light robot arms, where the flexibility exists, the solving of this problem is more complicated than the rigid link robot because the deformation variables (elongation and bending) are present in the forward kinematic equation. The finding of an inverse kinematic equation needs to obtain the relation between the joint angles and both of the end-effector position and deformations variables. In this work, a neural network has been proposed to solve the problem of inverse kinemati
... Show MoreIn this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la
Background: Fractures of the humeral shaft
accounting for approximately 3% of all
fractures. There is a wide array of good
options for their treatment and controversy
over the best methods. Although good
techniques of osteosynthesis are available, the
aim of this article is toemphasize on the benefit
and good outcome of conservative treatment
for properly selected cases to decrease the cost
and avoid the complications of surgery.