The reason behind choosing this topic " internal marketing (IM) of human resource management (HRM)" is to highlight the advantages of using IM in the organization framework. The problem of the research paper lies in not paying enough attention to employees genuine needs as they interact with each other in the sake of organization prosper. This research paper can be used as indictor to expose the weaknesses that the organization encounters daily. The current research paper attempts at examining the possibility of developing philosophy of internal marketing of human resources and its most practices, empowering staff, training courses, motivations and recognitions, and within departments communication, in order to reach targeted results such as performance, knowledge, and quality. That can be done through getting rid of processes that do not create value for the final product presented in the General Company for Electrical and Electronic Industries in Iraq. The main hypothesis of the research is to investigate whether the General Company for Electrical and Electronic Industries in Iraq applies IM as one of the significant approach to boost and alter employees' performance and attitudes in order to increase organizational commitment. The research in order to reach its target relied on the “check list” method, which is one of the case study methods that rely on personal observation and interviews mainly in its preparation. The “check list” involved different levels of management, directors, executives, and employees who work at General Company for Electrical and Electronic Industries in Iraq. The study reached a number of conclusions. The most important one is dissemination of culture and principles of IM of HRM within all units of the company. The benefits of this system lead to improve the overall company performance. Organizations should be more flexible in administrative decisions by opening diverse communication channels at all levels of management, viewing employees’ suggestions and listening to their complaints, and involving them in the decision-making process as a part of principles of internal communication.
In this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 containing 7.5% CNT was 179.54 m2/g, and the pore volume was 0.31
... Show MoreThe presence of antibiotic residues such as ciprofloxacin (CIPR) in an aqueous environment is dangerous when their concentrations exceed the allowable. Therefore, eliminating these residues from the wastewater becomes an essential issue to prevent their harm. In this work, the potential of efficient adsorption of ciprofloxacin antibiotics was studied using eco-friendly ZSM-5 nanocrystals‑carbon composite (NZC). An inexpensive effective natural binder made of the sucrose-citric acid mixture was used for preparing NZC. The characterization methods revealed the successful preparation of NZC with a favorable surface area of 103.739 m2/g, and unique morphology and functional groups. Investigating the ability of NZC for adsorbing CIPR antibioti
... Show MoreIn this research, CNRs have been synthesized using pyrolysis of plastic waste(pp) at 1000 ° C for one hour in a closed reactor made from stainless steel, using magnesium oxide (MgO) as a catalyst. The resultant carbon nano rods were purified and characterized using energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of carbon rods were observed with the Field emission scanning electron microscopy (FESEM). The carbon was evenly spread and had the highest concentration from SEM-EDX characterization. The results of XRD and FESEM have shown that carbon Nano rods (CNRs) were present in Nano figures, synthesized at 1000 ° C and with pyrolysis temperature 400° C. One of t
... Show MoreFor more than a decade, externally bonded carbon fiber reinforced polymer (CFRP) composites successfully utilized in retrofitting reinforced concrete structural elements. The function of CFRP reinforcement in increasing the ductility of reinforced concrete (RC) beam is essential in such members. Flexural and shear behaviors, ductility, and confinement were the main studied properties that used the CFRP as a strengthening material. However, limited attention has been paid to investigate the energy absorption of torsion strengthening of concrete members, especially two-span concrete beams. Hence, the target of this work is to investigate the effectiveness of CFRP-strengthening technique with regard to energy absorption of two-span RC
... Show MoreThis systematic review aimed to investigate the relation between orthodontic treatment (OT) and the incidence of the gingival black triangle (GBT) after completing treatment with a fixed orthodontic appliance, as well as the associated risk factors and the level of alveolar bone. Electronic and hand searches were conducted in three electronic databases for relevant articles published up to March 2022. Retrieved articles went through a two-step screening procedure, and the risk of bias (RoB) was assessed by the Joanna Briggs Institute checklists. The incidence of GBT after OT was set as the primary outcome, while the secondary outcomes were the risk factors associated with GBT and alveolar bone loss following OT. Out of 421 papers, 5
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More