Represent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreSix house-hold Abyssinian pumps distributed in different villages of Mansoura (Mans-I, Mans-II and Mans-III) and Talkha (Talk-I, Talk-II and Talk-III) cities, Egypt, have been selected for regular seasonal water quality assessment during 2017. Water samples have been collected within the mid-periods of four seasons Standard assessment tools were employed for the integrated water quality assessment including Water Quality Index (WQI) and ISO standard algal toxicity test. WQI displayed remarkable local and seasonal variations with excellent (≥ 90) and good (70 - 89) only recorded for water samples collected from Mans-I pump located in sparsely populated area and far 50 meters only from the eastern (Damietta) branch of Nile River. WQI of
... Show MoreAbstract
The aim of the current research is to identify the level of availability of written expression skills included in the Arabic language curriculum document among middle school students from the teachers' point of view. The researcher used the descriptive approach. To analyze the data and access the research results, he used the (SPSS) program. The research was conducted during the first semester of the academic year 1442/1443 AH on a random sample of Arabic language teachers in the Bisha Education Department. They reached about (213) male and female teachers. The results revealed a number of indicators: the level of availability of written expression skills among middle school students in Bisha governorate
... Show MoreThis study aims to investigate the academic leaders’ perceptions towards the degree of availability of the dimensions of organizational immunity systems at the University of Tabuk, as well as to reveal the statistically significant differences between the average responses of the study sample members about the degree of availability of these dimensions at their university due to the variables of (gender, leadership position, and college specialization). To achieve the objectives of the study, a descriptive survey method was used. The study population consisted of (200) male and female leaders who were academic leaders at the University of Tabuk. A questionnaire was used as a tool for collecting data, which its validity and reliability
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More