This research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes 12 questions to measure the excellence of the hotel service. The research sample included 43 employees' responding to this
... Show MoreStatisticians often use regression models like parametric, nonparametric, and semi-parametric models to represent economic and social phenomena. These models explain the relationships between different variables in these phenomena. One of the parametric model techniques is conic projection regression. It helps to find the most important slopes for multidimensional data using prior information about the regression's parameters to estimate the most efficient estimator. R algorithms, written in the R language, simplify this complex method. These algorithms are based on quadratic programming, which makes the estimations more accurate.
Giardia lamblia is one of most common protozoan cause diarrheas, and the most health problem in development countries worldwide. Our work aimed to assess activity and toxicity of metronidazole loaded silver nanoparticles in treatment of acute giardiasis in mice. After inoculated mice with Giardia cysts in a dose of 105 cyst for acute infection, treatments were given for eight days. Number Giardia cysts in stool were discovered. Toxicity nanoparticles was estimated by Measurement oxidative stress markers (GSH) and (MDA) in liver, kidney tissue homogenate. The results showed single therapy was better effect by silver nanoparticles, highest percentages of reduction in number of cysts Giardia lamblia of infected mice treated with silver nanopar
... Show MoreThere is a suggestion that an antidiuretic hormone-induced decrease in diuresis might contribute to the rapid relief of the acute pain in renal colic. This study was designed to evaluate the efficacy of desmopressin nasal spray compared with diclofenac given intramuscularly in patients with acute renal colic. The study included 75 patients randomized into three different groups; group A received desmopressin (40 μg, nasal spray), group B diclofenac (75 mg) intramuscularly and group C, both desmopressin and diclofenac. Pain was assessed using a visual analogue scale (a 10-cm horizontal scale ranging from `no pain' to `unbearable pain') at baseline, 10, 20 and 30 min after administering t
... Show More
Abstract:
We can notice cluster data in social, health and behavioral sciences, so this type of data have a link between its observations and we can express these clusters through the relationship between measurements on units within the same group.
In this research, I estimate the reliability function of cluster function by using the seemingly unrelate
... Show MoreGuanine has a variety of roles in chemistry, from its basic function in the storing and transferring genetic information to its usages in synthetic chemistry and other fields. Because of its distinct structure and biological importance, it is a fundamental component of contemporary study in organic chemistry and molecular biology. In this review, we focused on covering the synthetic pathways of various derivatives of guanine from the year 2000 until the present. As a result of the guanine molecule containing multiple functional groups, this gives us the ability to prepare several guanines such as O6-alkylating guanines, O6-benzylguanines, 8-aza-O6-benzylguanines, 9-substituted guanines, guanine-azo derivatives, guanine Schiff bases, guanin
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More