This research includes the using of statistical to improve the quality of can plastics which is produced at the state company for Vegetable oils (Almaamon factory ) by using the percentage defective control chart ( p-chart ) of a fixed sample. A sample of size (450) cans daily for (30) days was selected to determine the rejected product . Operations research with a (win QSB ) package for ( p-chart ) was used to determine test quality level required for product specification to justify that the process that is statistically controlled.
The results show high degree of accuracy by using the program and the mathematical operations (primary and secondary ) which used to draw the control limits charts and to reject the statistically uncontr
The Na-alginate bead is commonly used in biotechnology fields such as adsorption due to ion exchange between Ca and Na with elements. Scanning electron microscopy (SEM-EDX) has proven to be a comparative method in the detections of these adsorbed elements, but the un-flat forming area of beads that can introduce impossible of the detection of element adsorbed. In contrast, X-ray fluorescence (XRF) documents analysis of elements, direct examination, which may analysis the adsorbents of elements. Here, this Study evaluated the possibility by using XRF for the direct analysis for examples of Cd and Ag in a bench stand. This Study compared this to commonly use
... Show MoreThe pharmacokinetics and bioequivalence of a newly developed extended-released (ER) tablet containing 400 mg pentoxifylline as a test product was compared with the reference brand product Trental® 400 mg ER tablet produced by Sanofi-Aventis. Two separate studies were conducted simultaneously. The first study was conducted under fasting condition, whereas, the second study was conducted under fed condition; using the same batches of the test and reference products in both studies. In each study, both products were administered to 32 healthy male adult volunteers applying a single-dose, two-treatment, two-period, two-sequence, randomized crossover design with one-week washout period between dosing. Twenty two blood samples we
... Show MoreObjectives: To assess general social factors for elderly in geriatric homes in Jordan.
Methodology: The study was conducted for clients residing in elderly homes. A purposive sample of (155)
residents were selected. Social resource scale by (Duck University Center) called (OARA) older adult resources
and services was used as tool for data collection. The questions extract data about family structure, patterns of
friends and visiting, availability of a confident, satisfaction with the degree of social interaction and availability
of a helper in the event of illness or disability and the program of trips in the houses.
Results: The findings revealed that the life expectancy for women is greater than for men. In respect to
Summary First: The importance of the study and the need for it: The society is composed of an integrated unit of groups and institutions that seek to achieve a specific goal within a system of salary, and the family remains the most influential institutions on the individual and the unity of society, with the roles and responsibilities of the individual and society, and through the continuation and strength of other social organizations derive their ability On the other hand, any break-up in the institution of the family is reflected negatively on the cohesion of society and its interdependence, and the causes of this disintegration vary from society to another, but family problems remain the main factor in obtaining it. Second: Study Ob
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAbstract
The current research aims to identify the role of family upbringing methods in shaping adolescent gender identity disorder, to identify the causes, components, and disorders of the gender identity of adolescents, and to develop practical visions and suggestions to reduce and stop gender identity disorder completely. Due to the sensitivity of the topic, a questionnaire of five open-ended questions was posted on Facebook to collect the needed data, where (20) respondents answered these questions. The researcher took these (20) respondents as the study sample. The results revealed that excessive emancipation within the family, failure to employ family protection laws, and failure to monitor and follow up on
... Show MoreThe research aims at Identifying family dialogue of kindergarten’s parents. 2) Exploring the fears that kindergarteners suffer from. 3) Identifying family dialogue of kindergarteners’ parents and the fears of their children. To achieve the aim of the research, the researcher designed two scales: one for the family dialogue of kindergarteners’ parents, and the other for the fears of the kindergarten’s child. To identify the relationship between these two elements, the scale subjected to the consultation of a group of specialized expertise in educational and psychological sciences to certify the propriety of the items. The reliability of the scale of the family dialogue recorded (0.85). As for the scale of children’
... Show MoreArtificial neural networks usage, as a developed technique, increased in many fields such as Auditing business. Contemporary auditor should cope with the challenges of the technology evolution in the business environment by using computerized techniques such as Artificial neural networks, This research is the first work made in the field of modern techniques of the artificial neural networks in the field of auditing; it is made by using thesample of neural networks as a sample of the artificial multi-layer Back Propagation neural networks in the field of detecting fundamental mistakes of the financial statements when making auditing. The research objectives at offering a methodology for the application of theartificial neural networks wi
... Show MoreThe status of women in any society is one of the basic criteria for measuring the degree of progress that society and follow renaissance march side by sidewith men , and is no doubt that women are now of interest to the state , even if limited , which promotes public ideologies on the need for womens participation in economic infrastructure operations and social and the right to gain information and knowledge, entertainment and exercise its role in development through its president and actor in the family and raising the next generation configuration.
And affect the basic tributaries that draws them women information and ideas have a direct impact on the composition of cultural and cognitive entity woman comes satellite channels
... Show More