The research aims to test the effect of the behavioral factors (intangible) represented by an explanatory variable represented by organizational silence and a responsive variable of quality of Function life. The problem was the negative effects of the organizational silence on the morale of the employees and consequently their performance and the quality of function life. To collect the data and information needed to measure the two variables of research conducted in the health center / Sulaikh by taking a sample of (40) employees to test the hypotheses of research through the survey of their views, using statistical tools non parametric using the program. The most important recommendations were the establishment of training workshops for the purpose of developing the organizational silence. The quality of the employees' functional life is characterized by the art of dealing with others.
By March 2020, a pandemic had been emerged Corona Virus Infection in 2019 (COVID-19), which was triggered through the sensitive pulmonary syndrome (SARS disease corona virus- 2 (SARS COV-2). Overall precise path physiology of SARS COV-2 still unknown, as does the involvement of every element of the acute or adaptable immunity systems. Additionally, evidence from additional corona virus groups, including SARS COV as well as the Middle East pulmonary disease, besides that, fresh discoveries might help researchers fully comprehend SARS CoV-2. Toll-like receptors (TLRs) serve a critical part in both detection of viral particles as well as the stimulation of the body's immune response. When TLR systems are activated, pro-inflammatory cy
... Show MoreProduced water is accompanied with the production of oil and gas especially at the fields producing by water drive or water injection. The quantity of these waters is expected to be more complicated problem with an increasing in water cut which is expected to be 3-8 barrels water/produced barrel oil.Produced water may contain many constituents based on what is present in the subsurface at a particular location. Produced water contains dissolved solids and hydrocarbons (dissolved and suspended) and oxygen depletion. The most common dissolved solid is salt with concentrations range between a few parts per thousand to hundreds parts per thousand. In addition to salt, many produced waters also contain high levels of heavy metals like zinc, bari
... Show MoreMercury is a heavy metal that is extremely toxic. There are three types of it: inorganic, organic, and elemental. Mercury in all its forms has been shown to have harmful effects on living things. It can multiply its concentration from lower to higher trophic levels and accumulate in the body's various tissues. Aquatic organisms bodies have been exposed to mercury mostly through various human activities. The largest source of mercury pollution in the air is thermal power plants that mostly use coal as fuel. It is carried to a body of water after being deposited on the ground surface from the air. The way it enters the food chain is through aquatic plants and animals. Mercury accumulations in the kidney, liver, gills, or gonadal tissues of sp
... Show MoreLanguage ecology is the interactions between the environment and language. Such a discipline, ‘language ecology’ or ‘ecolinguistics has been founded by Einar Haugen’. Accordingly, the study aims at qualitatively reviewing the theoretical and conceptual issues surrounding the subject of language ecology by tracing the roots of language ecology. It further highlights the fundamental inconsistencies between how the concept of ecology is perceived in sociology and biology, and is applied to language, particularly, transposing the main central concepts of bio-ecology, such as relationship/interaction, environment, and organism to human language and theory of ecological-linguistic. The theory wavers among placing the focus
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreKE Sharquie, AA Noaimi, AR Bandar, SY Mohsin, Pigmentary Disorders, 2014 - Cited by 5
This research has discussed the origins of ESP, addressed key notions about ESP and examined issues in ESP syllabus design. The content of the paper was determined by a need identified based on my experience as an ESL instructor designing and delivering the content-based language program - Language Preparation for the Cadets and Employment in the Iraqi College of Police . These issues, where possible, have been supported by current and pertinent academic literature. It is my sincerest hope that these observations will lend insight into the challenges facing the ESL instructor acting as ESP syllabus developer.
The nuclear shell model was used to investigate the bulk properties of lithium isotopes (6,7,8,9,11Li), i.e., the ground state density distributions and C0 and C2 components of charge form factors. The theoretical treatment was based on supposing that the Harmonic-oscillator (HO) potential governs the core nucleons while the valence nucleon(s) move through Hulthen potential. Such assumptions were applied for both stable and exotic lithium isotopes. The HO size parameters ( and ), the core radii ( ) and the attenuation parameters ( and ) were fixed to recreate the available empirical size radii for lithium isotopes under study.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More