The study focused on the identification of the natural relation between the organizational components, and the most important is the organizational structure, which not hid its effect on each function and operation of the organizational structure through commanding the individual craters and its forms according to the requirement of these function, also it has relation with an organic synthesis that between the dimensions of the organic synthesis and the practice side in the commission of Integrity.
The problem of the research pensioned in some questions about hypothesis and theoretical parts, in which they go a mention about the hypothesis questions is to use all the knowledge's in this atmosphere and th
... Show MoreThe legal nature of the Build-Operate-Transfer-Ownership Contract (B.O.T) The Build, Operate, and Transfer of Ownership Contract (BOT) has emerged as the most successful and safest method for involving the private sector in public sector services. The major infrastructure projects that are built through the BOT contract are no longer financed by the state and its budget, but the private sector has played a major role in financing These projects, especially developing countries that need to establish infrastructure or modernize their existing infrastructure, especially in the areas of transport, communications, services, electricity, water ..... and other public utilities.
This study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand
Folic acid and multivitamin tablets containing Aspergillus flavus Penicillia spp. and Cladosporia spores were prepared at a compression pressure of 148 MN/m2 and stored at 35°C under different relative humidifies (75,85, and 95)% within air tight containers, to study the effect of storage condition on them, as well as ,the estimation of the microbial level of the raw materials intended to be used in the two kinds of tablets . Result showed that some raw materials derived from natural origin were heavily contaminated with microorganism compared to that of synthetic origin ,the results also indicated the effect of relative humidity , types of fungal spore , and the hygroscopic nature of exicpient upon survival. Multivit
... Show MoreThis paper details the process of designing, analysing, manufacturing, and testing an integrated solid-state hydrogen storage system. Analysis is performed to optimise flow distribution and pressure drop through the channels, and experimental investigations compare the effects of profile shape on the overall power output from the fuel cell. The storing of hydrogen is given much attention in the selection of a storage medium, and the effect of a cooling system to reduce the recharging time of the hydrogen storage vessel. The PTFE seal performed excellently, holding pressure over 60 bar, despite requiring changing each time the cell is opened. The assembly of the vessel was simple and straightforward, and there was no indication of pressure
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More