All businesses seek to improve their levels of profits through various means, most notably their marketing channels, which ensure the delivery of their products to their customers in a safe manner in a timely manner. It considers losses to a minimum and that insurance companies place great interest in marine insurance losses because they often constitute huge amounts compared to other losses, hence the problem of research, which is centred on the type and size of the impact owned by the channel The Iraqi insurance company was chosen to be applied according to the intentional sample method because this company is closely related to the subject matter. The research has reached a set of conclusions, most notably that the choice of i
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreE-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th
... Show MoreDestiny functional theory (DFT) calculations are undertaken in order to scrutinize the electrochemical and calcium (Ca) storage characteristics of a graphyne-like aluminum nitride monolayer (G-AlNyen) as an electrode material for Ca-ion batteries (CIBs). The results show that the change in internal energy as well as the cell voltage values for the CIB with the G-AlNyen anode are comparable to others with two-dimensional 2D nano-materials. It is shown that Ca is adsorbed primarily onto the center of a hexagonal and triangular ring of G-AlNyen with absorption energies of −2.06 and −0.42 eV. After increasing the concentration of Ca atoms on G-AlNyen, the adsorption energy as well as the cell voltage decreases. Lower values of 0.15–0.32 e
... Show MoreTourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show MorePolycaprolactone polymer is widely used in medical applications due to its biocompatibility. Electro spinning was used to create poly (ε- caprolactone) (PCL) nanocomposite fiber mats containing hydroxyapatite (HA) at concentrations ranging from 0.05 to 0.4% wt. The chemical properties of the fabricated bio composite fibers were evaluated using FTIR and morphologically using field-emission scanning-electron microscopy (FESEM), Porosity, contact angle, as well as mechanical testing(Young Modulus and Tensile strength) of the nanofibers were also studied. The FTIR results showed that all the bonds appeared for the pure PCL fiber and the PCL/HA nano fibers. The FESEM nano fiber showed that the fiber diameter increased from 54.13 to 155.79 (n
... Show MoreThe research discussed the possibility of adsorption of Brilliant Blue Dye (BBD) from wastewater using 13X zeolite adsorbent, which is considered a byproduct of the production process of potassium carbonate from Iraqi potash raw materials. The 13X zeolite adsorbent was prepared and characterized by X-ray diffraction that showed a clear match with the standard 13X zeolite. The crystallinity rate was 82.15% and the crystal zeolite size was 5.29 nm. The surface area and pore volume of the obtained 13X zeolite were estimated. The prepared 13X zeolite showed the ability to remove BBD contaminant from wastewater at concentrations 5 to 50 ppm and the removal reached 96.60% at the lower pollutant concentration. Adsorption measurements versus tim
... Show MoreThe present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado
... Show More