The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
This srudy aimed to use a new concentration from l\!J3T (Nitroblue tetrazolium) which using NADH stain ( by used eight different concentrations from (0.2% to 0.06% ).
That stain is a mitochondrial and cytoplasmic histochemical stain which gi ves more infom1ation about the metabolic activity of muscle fiber, so it is valuable in determining the types of muscle fibers and good fiber differentiation type {T) and type (TT) fibers), by reducing NBT in the location of enzyme and gives a blue color in different degrees according to the types of muscle fibers, and we noticed that the concentration 0.1% from NBT gives a good result and di
... Show MoreA newly derivative of oxazolidin-5- one namely [2-(2-biphenyl-4-yl-imidazo [1,2-a] pyridine-3-yl)-3-(4-nitro-phenyl)-oxazolidin-5-one (BIPNO5)] was examined as an corrosion inhibitor for carbon steel surface. Quantum mechanical method of Density Functional Theory (DFT) with (B3LYP (6-311++G (2d, 2p)) level of theory was used to calculate the minimize structure, physical properties and inhibition chemical parameters, in vacuum and two solvents (DMSO and H2O), all at equilibrium geometry. The results indicated that the new derivative could adsorb on the surface of carbon steel through the heteroatom, showing that the new inhibitor has good corrosion inhibition performance.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThe research aims to shed light on the nature of the tax gap in the income tax by the method of direct deduction and its reflection on the financial objective of the tax, and to determine the reasons for this gap in the deduction between the tax due in accordance with the laws and instructions in force and the tax actually paid. The tax gap is a real problem that cannot be ignored for what it represents loss of financial revenues due to the state.
The research problem is represented in the existence of a gap between the tax due according to direct deduction instructions and the tax actually paid according to the financial statements, and to achieve the objectives of the research and test the hypotheses, t
... Show MoreThe depth of causative source of gravity is one of the most important parameter
of gravity investigation. Present study introduces the theoretical solve of the
intersection point of the horizontal and vertical gradients of gravity anomaly. Two
constants are obtained to estimate the depth of causative source of gravity anomaly,
first one is 1.7807 for spherical body and the second is 2.4142 for the horizontal
cylinder body. These constants are tested for estimating the depth of three actual
cases and good results are obtained. It is believed that the constants derived on
theoretical bases are better than those obtained by empirical experimental studies.
The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show More