This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
Purpose: The diagnosis and determine the level of balance between the time available for life and work with the doctors in the hospitals of t the six hospitals in the City of Medicine.
Design / methodology / Approach: It has been relying on ready-scale, to make sure the diagnosis and determine the level of balance between the time available for life and work, where they were distributed on Form 42 doctors in the six hospitals in the City of Medicine, were analyzed by software (Nvivo and SPSS v.22).
Results: The results showed that there is a good level of balance between the time available for life and work with the doctors.
Research limitations: The diffi
... Show MoreThe research aims to determine the impact of Human Resources Accounting (HRA) on employee’s performance. The research’s problem was embodied in the lack of interest in HRA, which was reflected on the performance of employees in the Ministry of Education; the research adopted the descriptive-analytical approach, and the research community included the directors of departments and people at the headquarters of the Ministry of Education. The sample size was (224) individuals from the total community of 533. The questionnaire was adopted as the main tool for collecting data and information, as well as the interviews that were conducted by the researcher. In order to analyze t
... Show MoreThe objective of this study was to isolate and identify the asparaginase-producing bacteria, then purify and characterize the enzyme in order to investigate their properties in the future. Fifteen local bacterial isolates were isolated from various sites in the city of Baghdad, identified by conventional morphological and biochemical procedures, and confirmed using vitek 2 methods, and submitted to primary screening processes for asparaginase production. For secondary screening, eight isolates with the greatest yellow zone ability on a specific solid medium were chosen. Bacillus sp. was reported to have the highest enzyme production (7.5 U/mg proteins). After 24 hours of incubation, submerged fermentation yielded optimal conditi
... Show MoreEnvironmental pollution is experiencing an alarming surge within the global ecosystem, warranting urgent attention. Among the significant challenges that demand immediate resolution, effective treatment of industrial pollutants stands out prominently, which for decades has been the focus of most researchers for sustainable industrial development aiming to remove those pollutants and recover some of them. The liquid membrane (LM) method, specifically electromembrane extraction (EME), offers promise. EME deploys an electric field, reducing extraction time and energy use while staying eco-friendly. However, there's a crucial knowledge gap. Despite strides in understanding and applying EME, optimizing it for diverse industrial pollutant
... Show MoreThe present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders
... Show MoreIn this work, yttrium oxide particles (powder) reinforced AL-Si matrix composites (Y2O3/Al-Si) and Chromium oxide particles reinforced AL-Si matrix composites (Cr2O3/AL-Si) were prepared by direct squeeze casting. The volume percentages of yttrium oxide used are (4, 8.1, 12.1, 16.1 vol %) and the volume percentages of the chromium oxide particles used are (3.1, 6.3, 9.4, 12.5 vol. %). The parameters affecting the preparation of Y2O3/Al-Si and Cr2O3/AL-Si composites by direct squeeze casting process were studied. The molten Al-Si alloy with yttrium oxide particles or with chromium oxide particles was stirred again using an electrical stirrer at speed 500 rpm and the molten alloy was poured into the squeeze die cavity. Th
... Show MoreThe present study investigated the use of pretreated fish bone (PTFB) as a new surface, natural waste and low-cost adsorbent for the adsorption of Methyl green (MG, as model toxic basic dye) from aqueous solutions. The functional groups and surface morphology of the untreated fish bone (FB) and pretreated fish bone were characterized using Fourier transform infrared (FTIR), scanning electron microscopy (SEM) and Energy dispersive X-ray spectroscopy (EDS),respectively. The effect of operating parameters including contact time, pH, adsorbent dose, temperature, and inorganic salt was evaluated. Langmuir, Freundlich and Temkin adsorption isotherm models were studied and the results showed that the adsorption of basic dye followed Freundlich iso
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More