Purpose: In view of the trend toward using international financial reporting standards when generating financial statements, we looked at the interaction between audit services and non-audit services for auditors in the context of actuarial services for insurance firms. CPAs are authorized to work in banks and insurance businesses, but those with a practicing license obtained after earning a higher academic degree are not. Design/methodology/approach: A small number of auditing firms control the decisions issued by the Iraqi Accountants Association, monopolizing audit services in banks and insurance businesses. In the case of actuarial services used in reserve estimation, they are credited to an external party's account without any verification of the Reliability of the reserve estimation procedure. Originality/value: In addition to audit services, a scale has been developed to examine the auditors' non-audit actuarial services. The financial reporting rules for insurance contracts 17 and the examinations for acquiring an actuarial certificate in the United States of America are used to create this scale. Findings: The findings show that there is no substantial relationship between the two services supplied, and we recommend that the actuarial services be audited by specialist international companies that support the auditors' judgment on the computation of expected reserves in the financial accounts. Conducting specialist courses in the actuarial profession, and obtaining this credential is a requirement for auditing insurance companies.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe advertising has emerged as an effective force and an effective instrument upon with all organizations and companies depend on achieving their goals. In additional to the need to use promote sales, The nature and objective of advertising go beyond the scope of specific personal communication to a broader and more effective range for consumers from multiple groups and combination play need to use as well as the need to use means of communication than com convey the message more professional, The coincides with the rapid and remarkable development of all different media technologies and as much as possible social networking sites including mobile phone companies. The advertising has emerged as an effective force and an effective instrum
... Show MoreA total of (90) blood samples were collected from male patients infected with Toxoplasmosis who recovered from COVID- 19 and attended Kamal Alsamiraai Hospital from 15 January to 15 September 2021. We measured anti-Toxoplasma antibodies (IgG and IgM) detected by ELISA, whereas Anti-COVID-19 antibodies (IgG and IgM) were estimated using Elisa and Afilias. The semen characteristics were also studied among fertile, healthy individuals (control group) and sub-fertile patients. Results showed that the mean sperm count was high among the control group (40.5±1.3x 106/ml) compared with that of the sub-fertile patients (10.3±1.75 and 8.8±1.9 x 106/ml for oligozoospermia, and oligoasthenozoospermia respectively), and it was the highest (44.7±1.4
... Show MoreA numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw
... Show MoreBackground: The prevention of the enamel demineralization at the periphery of the brackets is a significant challenge to orthodontic professionals. The aim of this clinical study was to compare the Streptococcus mutants count in the plaque surrounding two orthodontic adhesive types, Fuji Ortho LC and Enlight (Ormco). Materials and methods: A total of 13 patients (7 male and 6 female) needing fixed orthodontic appliance therapy were participated. A split mouth technique was followed with appliances bonded by two orthodontic adhesive types, Fuji Ortho LC and Enlight (Ormco). Saliva was collected before placement of appliances (T0) and again at three weeks (T1) and six weeks (T2) after placement of appliances. Plaque was collected from areas a
... Show MoreBackground: Concha bullosa is an anatomical variation which defined by pneumatizaton of middle turbinate that occurred with an incidence of (5 to 25%) in the normal population.It has the potential to cause crowding and obstruction of the middle meatus and nasal cavity. There are many surgical techniques which utilized for its management. Study goal: Is to compare the formation of adhesion between endoscopic partial lateral middle turbinectomy and middle turbinate trimming in cases of concha bullosa. Patients and methods: A prospectivecomparative clinical trial was performed in the ENT department at Al-Shahid Ghazi AL Hariri Hospital in Medical City over the period from September 2016 to August 2017. Fifty nine (59) patients {24 males
... Show MoreCrop diseases are usually caused by inoculum of pathogens which might exist on alternate hosts or weeds as endophytes. These endophytes, cum pathogens, usually confer some beneficial attributes to these weeds or alternate hosts from protection against herbivores, disease resistance, stress tolerance to secondary metabolites production. This study was therefore carried out to isolate potential crop pathogens which exist as endophytes on weed species in the University of Ilorin plantations. Green asymptomatic leaves were collected from 10 weed species across the plantations, and processed for their endophytic fungi isolation. Isolates were purified into pure cultures and used for molecular identification using the internal transcribed spac
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreThis paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically.