The research aims to develop the general performance and improve the level of activity of private insurance companies in line with the current progress of the country. Besides, Evaluating financial performance to diagnose weaknesses and strengths in sample research companies and then developing appropriate solutions. The deviation in the financial performance of the research sample was revealed by measuring the various accounts of the company. The research sample included five companies in the private insurance sector listed in the Iraqi Stock Exchange Market, which represent the private insurance sector. The research concluded that the added economic value is a broad concept that goes beyond the traditional performance evaluation process and is based on compound costs related to the cost of debt, the weighted average cost of capital and the profits realized. The insurance sector witnessed the achievement of the added economic value. The results of the research show a great interest from the side of the management of companies in this concept; these results show as well that some of these companies have neglected the concept of the added economic value. The most outstanding recommendation is that all the financial and economic sectors are required to pay attention to the added economic value as a comprehensive performance of the company and a scale to compete, which is achieved through the compound costs of the calculation of the added economic value, which is a process that goes beyond the traditional evaluation process.
The research aims to analyze the television advertisement to monitor the indirect and underlying meanings behind the apparent significance in Zain’s “Ya Baghdad” Advertisement through sociological analysis, in accordance with the cultural analysis of Hofstede’s ‘Model of Cultural Dimensions’. Our choice of such a model in practical application over other models that may have provided more dimensions is due to its ability and verification in explaining cultural diversity and additionally the size of data and studies on the cultural dimension. This study’s aim is to verify the validity, stability and significance of this model before being adopted by Hofstede as a measurement tool. This model was used in order to analyze the rel
... Show MoreThe current research seeks to Analyze third intermediate chemistry book following sustainable development standards for academic year (2016-2017). To do this, a list of sustainable development standards that should be included in chemistry book was designed based on the previous studies. The first version of the list consisted of (50) sub-case divided into three standards (social, economic, and environmental) which was exposed to group of experts in teaching chemistry and teaching methods. The list has modified to (43) sub-case. The researcher followed the implicit and explicit meaning in his analysis: one for recording and repetition and the other for frequency. The result showed that third intermediate chemistry book has achieved (20)
... Show MoreLeaching process applied for the extraction of bio active compounds from dried roots of (Elecampane) Inula helenium. Ethanol, hexane and distillated water were used as solvents. Roots were soaked with ethanol (5% w/v) with various concentration of ethanol (30 to 98%) at one day to know effect concentration of the solvent with concentration of bio active compound in Inula helenium. The same procedure was done using hexane as solvent. Also distilled water was used as solvent for extraction 5%(w/v) where plant material was soaked in water at different temperatures (25, 40, 65, 80, and 90) C. In all solvents undertaken, the effect of time duration on active ingredient (Thymol, Isoalatolactone, Alatolactone, 10-isobutyryl-oxy 8-9-epoxy thymol is
... Show MoreBubbled slabs can be exposed to damage or deterioration during its life. Therefore, the solution for strengthening must be provided. For the simulation of this case, the analysis of finite elements was carried out using ABAQUS 2017 software on six simply supported specimens, during which five are voided with 88 bubbles, and the other is solid. The slab specimens with symmetric boundary conditions were of dimensions 3200/570/150 mm. The solid slab and one bubbled slab are deemed references. Each of the other slabs was exposed to; (1) service charge, then unloaded (2) external prestressing and (3) loading to collapse under two line load. The external strengthening was applied using prestressed wire with four approaches, wh
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
A simple, accurate and rapid method for separation and determination of most commonly usedinsecticides in Iraq [thiamethoxam (Thi), imidacloprid (Imi), indoxacarb (Ind), and abamectin (Aba)] ispresented. The separation was performed by gradient reversed-phase high performance liquidchromatography on a C18 stationary phase column. The method was developed and validated. The-1mobile phase was a mixture of acetonitrile and water using gradient flow. The flow rate was 1.0 mL min .The optimum temperature of separation was 25 ºC. The detection was performed at multiple wavelengths.The analysis time was up to 10.5 minutes with retention times of 3.221, 3.854, 6.385, and 9.452 min for-1the studied insecticides. The linearity was in the range of 0.
... Show MoreThis paper presents thermal characteristics analysis of a modified Closed Wet Cooling Tower (CWCT) based on heat and mass transfer principles to improve the performance of this tower in Iraq. A prototype of CWCT optimized by added packing was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of the air measured at intermediate points of the heat exchanger and packing. Heat exchangers consist of four rows and eight columns for an inline tubes arrangement and six rows and five columns f
... Show MoreThis Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro
... Show MoreThis Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More