Free Radical Copolymerization of Styrene/ Methyl Methacrylate were prepared chemically under Nitrogen ,which was investigated, in the present of Benzoyl Peroxide as Initiator at concentration of 2 × 10-3 molar at 70 °C, which was carried out in Benzene as solvent to a certain low conversion . FT-IR spectra were used for determining of the monomer reactivity ratios ,which was obtained by employing the conventional linearization method of Fineman-Ross (F-R) and Kelen-Tüdos (K- T). The experimental results showed the average value for the Styrene r1 / Methyl Methacrylate r2 system, Sty r1 = 0.45 , MMA r2 = 0.38 in the (F–R) Method and r1 = 0.49 , r2 = 0.35 in the (K–T) Method, The Results of this indicated show the random distribution of monomers in the copolymer.Likewise The monomer reactivity ratios were evaluated Mathematically in comparison in the (F–R) Method with the data STY r1 = 0.61 , MMA r2 = 0.47 , and r1 = 0.45 , r2 =0.38 in the (K–T) Method. And were used the values r1 ,r2 for STY / MMA Copolymers in computing integral curves for the instantaneous Copolymer composition throughout the whole range of conversion.
Academic achievement is a professional standard for measuring student levels in the first stages. Therefore, any indication of the level of achievement makes us in an attempt to employ students in evening schools. The researcher has developed a closed questionnaire of (36) paragraphs. A total of (164) male and (24) female students were chosen from evening schools. The result of this research revealed that the number of students was a reason for the low level of their achievement, the lack of laboratories, educational methods, and techniques of the most prominent problems confirmed by students in these schools. In addition, to support educational institutions with their necessary needs. The most important conclusion in this research is th
... Show MoreThat corruption with all its forms, has prevailed over the whole world, but with different degrees relaying on the one who leads these countries of rulers, followers and officials who have been deemed the main reason for that corruption, but if these rulers were righteous, These countries would have blessed and elevated and were corrupt unjust tyrants who were the disaster that befell the chiefs of those countries with ruin, misery, and backwardness. This is what we sought to prove and clarify by considering the verses of the Holy Qur’an in respect with this topic. The research includes an introduction, two topics, and a conclusion.
 
... Show MoreThe origin of occupations and trades producing goods and services necessary for the members of society
When people are designated to perform this task, in which case the state of change is included in the imposition of adequate labor rights, and may change from imposing sufficient to imposing the eye
Does the state have the right to compel "tradesmen and professions" to do their jobs?
Therefore, this research came to address the legitimacy of this from the perspective of the Islamic economy.
The entrance process re-engineering one of the main entrances of administrative and technology appropriate to keep pace with scientific progress and the continuing changes in business environment and for the purpose of achieving the goal sought by the organizations in the pursuit of rapid developments and renewable energy in the market competition by changing its operations and activities of the radical change which contributes to an effective contribution to reducing the cost of product or service taking into account the quality improvement in the management of change to keep the increase value and speed of placing on the market to meet customer needs and desires to achieve a
... Show MoreThis study presented an endeavour to integrate the value chain activities with the Balanced Scorecard for a comprehensive evaluation of an organization’s strategic performance. It also demonstrated the connection and the integration of the activities of the value chain with the Balanced Scorecard. The financial measurement was linked with non-financial measurement by integrating these techniques to achieve an appropriate performance that supports all aspects of the organizational performance. Consequently, the research problem in this study emerged, which is due to the concentration of many organizations on the measurement of financial performance. Notably, the latter caused the decline of some organizations from the competitive market. T
... Show MoreThe present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More