Preferred Language
Articles
/
FRfnZZABVTCNdQwCfInP
Systematic Reviews in Pharmacy | open access Journals
...Show More Authors

Systematic Reviews in Pharmacy is a monthly Peer-review open access Journal,different scientists involved in Pharmaceutical research and development

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
Leadership and Internal Communication Strategies in Public Organizations: Analytical Research
...Show More Authors

Purpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership.   Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance.   Design/methodology/approach: The  study  uses the  ordinary  least  squares  (OLS) and  applied multiple  regression A sa

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of Volumetric Mass Transfer Coefficient in Fixed Bed Adsorption
...Show More Authors

This work was conducted to determine the volumetric mass transfer coefficient (Ky.a) infixed bed adsorption using hexane-benzene mixture by adsorption onto a fixed bed of white silica gel. Benzene concentration was measured by gas chromatography. The effect of feed flow rate and initial concentration of benzene in hexane-benzene mixture on the volumetric mass transfer coefficient and on the adsorption capacity of silica gel was investigated.

In general, the volumetric mass transfer coefficient increases with increasing hexane flow rate, and with increasing initial concentration of benzene in the mixture. The ultimate value of (Ky.a) was at 53 ml/min of hexane flow rate with benzene initial concentration of (6.53 wt. %), and it wa

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
International Medical Journal V
Acceleration of Tooth Movement in Orthodontics: A Review of Literature
...Show More Authors

Objectives: The demand for orthodontic treatment is nowadays increasing significantly for aesthetic improvement and to correct various kinds of malocclusion, yet the prolonged treatment time remains the main obstacle. This review aimed to demonstrate various orthodontic techniques and highlight the evidence-based successful approaches used for acceleration of orthodontic tooth movement. Materials and Methods: Data and sources of information pertaining to accelerated orthodontic tooth movement premised on English-written articles were searched using electronic databases including Google Scholar, Scopus, PubMed and MEDLINE. Results: This review demonstrated the availability of different surgical and non-surgical methods to enhance tooth movem

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The fate of Pharaoh's magicians in the Quran : objective study
...Show More Authors

Out of the search for the truth, the reader of the Holy Qur’an should know the fate of the sorcerers whom Pharaoh threatened when they announced it as pure monotheism in front of seeing the stick as it turned into a clear serpent, when they said: We believe in the Lord of the worlds, the Lord of Moses and Aaron, and the clear promise came to cut and crucify the trunks of palm trees, and they said what they said if Being supplicants to God (May God cause us to die as Muslims), did Pharaoh actually carry out what he promised them?? So we studied that subject from this angle. Because what looms on the horizon of the Holy Qur’an is that there is no one who seeks refuge with God Almighty in times of adversity except that God Almighty has

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Some responses to ancient grammarians And contemporary researchers In monograms
...Show More Authors

Some responses to ancient grammarians
And contemporary researchers
In monograms

View Publication Preview PDF
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
The effect of fainting on a person’s behavior in (worship)
...Show More Authors

The Messengers and the Imam of the God-fearing, Muhammad is God, his family, and all of his companions. As for what comes after... Fainting is one of the involuntary symptoms and states that occur to a person when carrying out his life’s tasks suddenly due to his loss of sense and movement, so he loses consciousness for a period of time that is short or may be long, and the person is held accountable and responsible for every moment of his life. He is required to perform duties specified by Sharia law, such as prayer, fasting, and Hajj...and fainting prevents him from performing these actions. We must consider the opinions of jurists and know the legal implications resulting from it. It was said that a person has a capacity that enable

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Graphic privacy in vector graphics design for children's publications
...Show More Authors

         The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Figurative theory (Gestalt) and its applications in Iraqi musical templates
...Show More Authors

The musical templates are the fundamental reason for admiration and interest among a lot of cultural and societal medias because of the beauty of it's melodic value, where a lot of Iraqi singing and music specialists and composers try to consolidate daily life idea and translate it into music in a manner that preserve the template and rhythm horizontally and vertically, through the involvement of the scientific and philosophical concepts and theories of modern thought to reach the recipient,, as is the theory of form (Gestalt), one of the most important theories that stretched to their interpretations to the field in general art and in music science, especially, as an area that can be manifested as partial components template music, conn

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref