The maritime borders of the coastal state are the scene of the human tragedies that we are witnessing in the context of the perilous plight of refugees at sea، and the failure to help people at risk by the coastal state will entail international responsibility towards them، and the three international maritime conventions، commitments aimed at coastal states with the duty to provide assistance and rescue to persons in danger of being lost at sea، is without doubt one of the most basic principles established in the law of the sea، in addition to establishing and operating And maintenance of the search and rescue service، and not to expel them and return them to their country of origin or another country.
The current researsh is aimed to pay attention on concept of human resources hard (Difficult) to manage. Such style of human resourcses has emerged to form anew challenge for busniess organizations.
Management such human resources entails first determing incentives of their behaviour models. Analyzing these models will be important to strategical management of them from work.
In nutshell, this researsh try to recommendation of contemporary literature about future of difficult (hard) human resources management.
Background: The hip joint and lumbar spine are both anatomically and functionally closely related as had shown by many authors. So the abnormality in one area can affect the other e.g. hip joint osteoarthritis can cause lumbar sagittal malalignment and backache.
Objectives: is to see if there is significant improvement in backache after total hip replacement? And which degree of backache improvement is associated with significant changes in lumbar lordosis?
Methods and patients: a prospective open trial study was performed on 30 patients who had severe hip osteoarthritis and chronic low back pain. Total hip replacement was performed to all patients. Backache and lumbar lordosis were measured by visual analogue scale and Cobb’s an
Background: Urinary tract infection (UTI) is the most common bacterial infection in women in general and in postmenopausal women in particular. Bacteriuria occurs more often in elderly functionally impaired women but in general many of it are asymptomatic.However the risk factors associated with recurrent UTI in elderly women are not widely described.Bacteuria in elderly women is associated with high mortality rates ,however many of thus bacteriuria are asymptomatic (Assel et al.,2009).The belief that diabetes ,a common metabolic disorder is associated with ahigher risk of UTI is widespread,diabetes result in several abnormalities of the host defense system that might result in a higher risk of certain infection.
Patient and Method: T
The deficiency in the nurse staff in the health organizations consider an important problem that must be studied and solved basically , not only because it affect on the health organization and it's strategic goals , but also it affect the human being and it's health which can't be substituted with anything or delayed in it's treatment ,This research aims to necessary for health organizations to strategically help in maintaining the nurse staff and to keep that in it's strategic orientation and it's mission , moreover , the health organizations must study the reality of the nurse in the health organizations and know the causes beyond leaving the nurse staff the nurse job , and then remove
... Show Moreالمقدمة
تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.
وعموماً فإن لعملية التسعير م
... Show MoreThe individual average income is considered one of the most used criteria for the distinguishing between the developed and the developing countries, for this reason the efforts of economic development has been construed on increasing the average national income, the investment expenditures is considered one of the basic foundations for economic development operation which lead to the expanding the prodection power of the economy, and increasing the level of national income in an averages greaten than the primary expenditures due to the work and interaction between the multiplier and the accelerator. But the ability of the economic sectors in the generation of national income as a result of the primary expenditures is different fr
... Show MoreThe estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth
... Show Moreالمقدمة ومنهجية البحث
تتفق أغلب الأدبيات ومنها المحاسبية, بأن الخطوة الأولى في وضع وتقييم أي نظام إداري أو محاسبي هي في صياغة أهداف ذلك النظام لما لذلك من أهمية في توفير معيار للحكم على كفاءة التطبيق من عدمه.
وتعرف الأهداف بأنها (النهايات التي تعمل أو توجه النشاطات باتجاهها أو هي النهايات التي تطمح النشاطات تحقيقها). ( 1 ) ..,
كما تعرف أيضا بأنها (الأ
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More