Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
Transparency considered being one of the modern administrational terms which started to be largely used in the last period, because of its political, economical, social and cultural dimensions. As well as, its administrational dimension that helps to create a work environment marked by order and flawless from wrong practices and Transparency provides credibility to the sides that pursue it in their practices, till it became a mean of distinction. The choice of the subject of the research ((Transparency and its effect on Level of Job satisfactions of Workers in General Insurance company)), which aims to measure the effect of Transparency in Level of Job satisfactions of Workers in Insurance company. Came in the time when many countries te
... Show MoreThis study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me
... Show MoreProcessed and red The Western diet, a modern dietary pattern, typically consists of meat, sugar-filled beverages, candies, chocolates, fried foods, prefabricated meals, refined cereals, conventionally produced animal products, high-fat dairy products, and high-fructose items. The goal of this review is to outline how the Western pattern diet affects gut microbiota and mitochondrial fitness, as well as metabolism, inflammation, and antioxidant status. Cancer, mental health, and cardiovascular health; We offer a thorough analysis of how the westernized diet and related nutrients affect immune cell responses as well as the hygienic costs of the Western diet. A consensus critical evaluation utilizing primary sources, including scientifi
... Show MoreThe laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreThe thermodynamic constanting of “crude and partially purified” Paraxonase(PON) was evaluated in the sera of “healthy and ectopic” pregnant women in order to characterize the reaction of PON with diethyl para-nitro phenyl phosphate as substrate.This study was performed on (17) women with ectopic pregnancy (EP) whose age between (25-55) years and (25) normal pregnant women with a mean age of (25 -55) years as a control group . Samples were collected from the Medical City, AL-Yarmook and Fatema AL-Zahraa hospitals during the period from Sep.2011 to April 2012.The study included the evaluation of “paraxonase activity, specific activity and total protein” in the (crude and partially purified) sera of EP pa
... Show MoreOccupies an important geographical position, and instructional material is distinctive among the various course materials, as covered in the study of human and surrounding environment, and interaction happening between them, and the problems that arose as a result and a lot of reliable in achieving educational purposes. Through the monotony and tradition in the methods used in our schools in the teaching of geography, which prevails in teaching nature conservation and indoctrination with poor educational qualification as a teacher geography, and the fact that this article need to be effective methods for teaching, such as the use of teaching models modern-dependent student at the center of the process education, and this is confirmed by
... Show Moreيهدف البحث عن الاساليب والعوامل التي ترفع من قدرات اللاعبين البدنية و المهارية للتواصل مع التطور المطلوب حيث وجد ان هناك حاجة ملحة لتطوير الهجوم السريع الفردي وذلك لضعف و تذبذب الاداء الفني بكرة اليد تحتاج في المباراة الخاصة السرعة الانتقالية التي ترتكز عليها صفة السرعة دون الهبوط بالمستوى المطلوب لتحقيق ثمرة جهد هذا الاداء بأداء تصويبه في مرمى الفريق الخصم لمحصلة هذا الاداء المميز يتطلب ان يكون كل لاعب من
... Show MoreKHalaf Alhmar and what we get from his poem
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More