A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath
The study aims to build a model that enhances trust-building for public and private banks to compare and determine the significant differences between public and private banks, by testing the impact of governance mechanisms (transparency, accountability, justice, independence, and social responsibility) (Agere, 2000) on trust-building strategies (trust and trust building, people management, work relations, training and development, leadership practices, and communications) (Ngalo, 2011; Stone et al., 2005), to indicate the level of employees’ awareness of the theoretical contents of the two variables and their importance to banking work, with the aim of improving performance. The main question is the role of governance mechanisms
... Show Moreackground An autoimmune and inflammatory illness called rheumatoid arthritis (RA) occurs when your immune system mistakenly attacks normal cells in your body. Interleukin-35 is a brand-new cytokine that belongs to the immunosuppressive and anti-inflammatory IL-12 family. β -herpesvirus that produces inflammation and stays dormant in its host for life is the human cytomegalovirus. Human herpesvirus (HCMV) has been at the core of several RA-related theories. Objective The current study looked at the association between RA and serum IL-35 levels as well as the association between RA and CMV. Patients and methods Blood samples were taken in the Baghdad Teaching Hospital and Typical Rheumatology Unit from January 2022 to Mars 2022 for the curre
... Show MoreThe last ten years observed a shift enormous scientific in the method and way that it deals professional with the cost accounting and reflected the result those shift enormous scientific of increase the competitive environmental that accompanied the emergence of a modern manufacturing environmental on surface the long roductive life and emergence advanced information technology that give a central focus of his important on client with growing global markets growth on a large scale.
The research aim to define the concept of cost awareness, the concept and methods of strategic cost management and the role of cost awareness for managers of industrial units in strategic of cost managem
... Show MoreActivity test of the inhibitors purified from barley and broad beans crop proved the inhibition activity against 6 types of rots Pencillium ssp and Aspergellusflavus and Aspergillus niger and Fusarium solani and Fusarium semitectum and Mucor with three concentrations 0.1 and 0.2 and 0.3 mg/ml, where the inhibitor purified from the second peak of broad beans proved that it had a higher inhibition activity against the growth of test rots which were 53.75 and 62.5 and 78.5 and 76.25 and 84 and 18.8% respectively, at 0.3 mg/ ml followed by the first peak of the inhibitor purified from broad beans the inhibition activity were 43.75 and 50 and 62.96 and 75 and 80 and 12.5 then the inhibitor purified from barley in which the inhibition activity
... Show MoreAbstract
The critical success factors of the means of the most modern in determining the main directions for organizations to achieve competitive advantage. and can be a critical success factors in organizations that overlap in the functional areas of the organization. that successful organizations use these factors to get to the uniqueness and distinction. as the entrance of critical success factors with the capacity Evaluative phase correction because discovery increases the perception of managers of what is important to the organization and using them to get to the Strategic Entrepreneurship. as it begins in terms of permanence of success and
... Show MoreThe purpose of this paper is to identifying some of the physical, kinetic and electrical capabilities of the working muscles of patients with simple hemiplegic cerebral palsy, preparation of special exercises (rehabilitation and water) accompanied by symmetrical electrical stimulation in the rehabilitation of working muscles for patients with simple hemiplegic cerebral palsy, and identifying the effect of exercises, especially (rehabilitation and water), accompanied by symmetrical electrical stimulation, on some physical, kinetic and electrical capabilities in rehabilitating working muscles for patients with simple hemiplegic cerebral palsy. The researcher used the experimental approach with a one-group design with two pre and post-tests du
... Show MoreUnter Exilliteratur versteht man „die literarische Produktion von Autoren, die wegen politischer, religiöser oder rassistischer Verfolgung gezwungen sind, sich an einem anderen als dem von ihnen gewünschten Lebens- und Arbeitsort aufzuhalten.“[1] Deswegen unterscheidet sich „Migration“ von „Exil“ dadurch, dass sie freiwillige Auswanderung ist. Bereits in der Antike und auch im Mittelalter gab es Schriftsteller, die vor Zensur oder politischer Verfolgung ins Exil geflohen sind, wie zum Beispiel der griechische Satiriker des
... Show MoreSo I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreIn this research paper, two techniques were used to treat the drill cuttings resulting from the oil-based drilling fluid. The drill cuttings were taken from the southern Rumaila fields which prepared for testing and fixed with 100 gm per sample and contaminated with two types of crude oil, one from Rumaila oilfields with Sp.gr of 0.882 and the other from the eastern Baghdad oilfield with Sp.gr of 0.924 besides contamination levels of 10% and 15% w/w in mass. Samples were treated first with microwave with a power applied of 540 & 180 watts as well as a time of 50 minutes. It was found that the results reached below 1% w/w in mass, except for two samples they reached below 1.5% w/w in mass. Then, the sample of 1.41% w/w in mass,
... Show More