The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative material for raw materials in engineering construction. Countless types of solid waste can be used in different ways and quantities according to the purpose for which they are intended, for example the use of rubber, construction waste, ash and many others. This study discusses the problem of solid waste and methods of its management, in addition to its use with building materials in order to improve their properties and reduce costs.
In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.
Purpose/objective:
1 - To explain the financial impact of the activities and areas of human resources management and the adoption of the methodology for estimating costs on the basis of conduct and statement of how to assess costs and benefits of human resource activities.
2 - Measuring human capital, and its impact on the financial statements.
Design/methodology/approach:
Concentrated dimensions of the research paper's lack of financial statements prepared by the organizations for information mandated human resource its components of the three (attraction - development
... Show More
Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.
Then:
Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of inf
... Show MoreA shocking third species emerged from a family of coronaviruses (CoV) in late 2019 following viruses causing SARS (Severe Acute Respiratory Syndrome-CoV) in 2003 and MERS (Middle East Respiratory Syndrome-CoV) in 2012; it’s a novel coronavirus now called severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; formerly called 2019-nCoV). First emerging in China, it has spread rapidly across the globe, giving rise to significant social and economic costs and imposing severe strain on healthcare systems. Since many attempts to control viral spread has been futile, the only old practice of containment including city lockdown and social distancing are working to some extent. Unfortunately, specific antiviral drugs and vaccines remain u
... Show MoreThis research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe
