The aim of the research is to identify the role of public relations in promoting tourism by the Palestinian tourism and travel companies in Gaza from the public relations officer’s point of view in those companies.
The researcher used the descriptive analytical method as the most appropriate for such studies and implemented the questionnaire as a tool to obtain the required data from the respondents.
The Researcher reached several conclusions:
1- There is a low percentage of women working in the field of public relations in Palestinian tourism establishments in the Gaza Strip, where the percentage did not exceed 5%.
2- The interpersonal communication counted as one of the elements of integra
The current research aims to identify the effectiveness of a computerized program in developing mathematical skills among the first cycle students in basic education schools in the Sultanate of Oman. The two researchers used the quasi-experimental approach on an intentional sample consisting of (40) male and female students at Al Kawakeb School for Basic Education (1-4). Two of the basic fourth-grade classes and then randomly distributing them into two groups, one is experimental (20) male and female students who followed the computerized interactive program, and the other is (20) male and female students followed the traditional way. On the other hand, its reliability has reached (0.81), and the results of the research have concluded th
... Show MoreThis research aims to clarify the role of Information Technology Competency (ITC) with dimensions' (IT Usage, IT Knowledge, and IT Operations) as an independent variable in the activation of Human Resources Management Practices (HRM Practices) as a dependent variable with dimensions' (Training and Development, Recruitment, Job Design, and Performance appraisal). Based on this, the correlation and effect relationships between the independent and dependent variables are determined by formulating two main hypotheses. There are a significant relationship and effect of IT competency with HRM practices within the dimensions. Furthermore, the scope and population of this research are the Informatics and Communications P
... Show MoreThis study included the extraction of volatile oils from the leaves of some local Eucalyptus trees (i.e.(1)E.camldulensis ,(2) E.camldulensis , E.microtheca , E.globules , E.sideroxylem , E.krusianin. by the water distillation method. As well as exploring some of their physical properties. The results of this study reveald that the local eucalyptus trees gave a good rate of volatile oil equals to some global kinds and to the rate in India pharmacopeia. Also the results revealed that there had been concurrence between the percentages of volatile oils and refractive index and specific gravity of the plants on which the study was made to study and those included i
... Show MoreLet be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space
Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
We study in this paper the composition operator of induced by the function ?(z)=sz+t where , and We characterize the normal composition operator C? on Hardy space H2 and other related classes of operators. In addition to that we study the essential normality of C? and give some other partial results which are new to the best of our knowledge.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreNew two experiments of the three factors, in this study were constructed to investigate the effects, of the fixed variations to the box plot on subjects' judgments of the box lengths. These two experiments were constructed as an extension to the group B experiments, the ratio experiments the experiments with two variables carried out previously by Hussin, M.M. (1989, 2006, 2007). The first experiment box notch experiment, and the second experiment outlier values experiment. Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box lengths and
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.