Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of deviations Department knitting socks and put several alternatives to the management for the purpose of decision-making. And for the purpose of access to the goal of research The research was based on a fundamental premise (that the use of technical review and evaluate programs lead to understanding and improving the implementation of the cost method on the basis of activity). It adopted a researcher at the theoretical side on the method of inductive sources, references and research available in the international information network (Internet), but the practical side has been relying on the descriptive approach through the financial statements, interviews, and meetings with officials in the company sample, as well as follow-up field.
This study is conducted to determine the effect of pathogenicity of the fungus Lecanicillium lecanii in some aspects of life of the insect saw toothed beetle Oryzaephilus surinamensis L. (Coleoptera: Silvanidae) under laboratory conditions with three concentrations of spores and mildew commentator (1 × 103, 1 × 105, 1 × 107) spore / ml , on eggs and larvae second phase of the insect .The study also includs the effect of the fungus concentrations of germination on rice (jasmine) by using direct spray treatment. The results show great fungus efficiency in the control of some aspects of life of the insect, where varied efficiency depends on the concentration of spores, The highest percentage loss of eggs is 63.33% at a concentration
... Show MoreIt is a well-known fact that publishing companies spend much money, time and energy in designing their book covers to attract potential customers. As the first thing people do when they buy or intend to buy a book is looking at its front cover. However, if there is a need to know more about the book, people usually look at the information on its back cover. This paper attempts to explore the persuasive function of blurbs beyond the constraints of the academic domain and consequently their connection with advertising discourse in two main sections: The first presents the concept of blurb and its structure while the second defines persuasion and shows the most prominent strategiesused in blurbs. Finally, this paper gives the conclusion tha
... Show MoreThe purpose of this research work is to synthesize conjugates of NSAIDs (ibuprofen, and naproxen) with sulfadiazine as possible mutual prodrugs to overcome the local gastric irritation of NSAIDs with free carboxyl group by formation of ester linkage that supposed to remain intact in stomach and may hydrolyze in intestine chemically or enzymatically; in addition to that attempting to target the synthesized derivative to the colon by formation of azo bond that undergo reduction only by colonic bacterial azoreductaze enzyme to liberate the parent compound to act locally (treatment of inflammation and infections in colon)
Transient three-dimensional natural convection heat transfer due to the influences of heating from one side of an enclosure filled with a saturated porous media, whereas the opposite side is maintained at a constant cold temperature, and the other four sides are adiabatic, were investigated in the present work experimentally. Silica sand was used as a porous media saturated with distilled water filled in a cubic enclosure heated from the side,using six electrical controlled heaters, at constant temperatures of (60, 70, 80, 90, and 100oC). The inverse side cooled at a constant temperature of (24oC) using an aluminum heat exchanger, consisted of 15 channels feeded with constant temperature water. Eighty thermocouples were used to control t
... Show MoreThis study was aimed to investigate the response surface methodology (RSM) to evaluate the effects of various experimental conditions on the removal of levofloxacin (LVX) from the aqueous solution by means of electrocoagulation (EC) technique with stainless steel electrodes. The EC process was achieved successfully with the efficiency of LVX removal of 90%. The results obtained from the regression analysis, showed that the data of experiential are better fitted to the polynomial model of second-order with the predicted correlation coefficient (pred. R2) of 0.723, adjusted correlation coefficient (Adj. R2) of 0.907 and correlation coefficient values (R2) of 0.952. This shows that the predicted models and experimental values are in go
... Show MoreOsmotin and osmotin-like proteins belong to the PR-5 pathogenesis-related group of proteins and are induced in response to various types of biotic and abiotic stresses in several plant species. Carrot was transformed with a tobacco osmotin gene that encodes a protein lacking the vacuolar-sorting motif that is composed of a 20-amino-acid sequence at the C-terminal end, under the control of the cauliflower mosaic virus 35S promoter, using Agrobacterium-mediated transformation. Transgene integration and expression were confirmed by Southern and western blot analyses, and three selected transgenic lines were evaluated for their ability to tolerate drought stress. Under drought stress conditions, all transformants exhibited slower rates of wilti
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More