Preferred Language
Articles
/
-xfkupIBVTCNdQwCz74V
Proposal of a guide for talent evaluation and management based on a qualitative and three-staged approach
...Show More Authors
Purpose

The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.

Design/methodology/approach

The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty-three individuals from six Australian universities participated in this study.

Findings

The qualitative study explored three key themes and ten subthemes of TMPs that are used in AHE. These were: (1) talent attraction, (2) talent development and (3) talent retention.

Research limitations/implications

This study only targeted one country (Australia) and one sector (HE).

Practical implications

This study offers three major contributions as follows: theoretical, practical and policy aspects. Theoretically, the study provides a value-add to Talent Management (TM) theory through designing a guide (conceptual model) of TMPs for the HE sector. Practically, it collects original qualitative data regarding TM in the HE domain. From a policy point of view, this study adds more debate around adding new ideas to Australian education strategic plans for HE.

Originality/value

This study has a unique methodology because of strengthening the effect of an in-depth case study. For instance, two different techniques were used for data analysis for the same research objective as follows: (1) both manual methods and content analysis software (NVivo 11) and (2) the three-stage approach. Using these techniques for the same purpose in one study can provide greater flexibility to examine the relationship between theory and data.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative Evaluation of the Effect of Different Universal Adhesives and Bonding Techniques on the Marginal Gap of Class I Composite Restoration (A SEM Study)
...Show More Authors

Background: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 10 2025
Journal Name
Proceedings On Engineering Sciences
WAREHOUSE IN INDUSTRY 4.0 BASED DRONE, COMPUTER VISION, AND ARTIFICIAL INTELLIGENCE TECHNOLOGIES: A LITERATURE REVIEW
...Show More Authors

View Publication
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 13 2012
Journal Name
Journal Of Kerbala University
Thermo physical behaviour of binary and ternary systems for cyclohexanol with some Ketones at three temperature
...Show More Authors

Publication Date
Wed Dec 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Equilibrium Mixing Index and Optimum Mixing Time for Three solid materials in Fluidized Column
...Show More Authors

     Equilibrium and rate of mixing of free flowing solid materials are found using gas fluidized bed. The solid materials were sand (size 0.7 mm), sugar (size0.7 mm) and 15% cast iron used as a tracer. The fluidizing gas was air with velocity ranged from 0.45-0.65 m/s while the mixing time was up to 10 minutes. The mixing index for each experiment was calculated by averaging the results of 10 samples taken from different radial and axial positions in fluidized QVF column 150 mm ID and 900 mm height.

     The experimental results were used in solving a mathematical model of mixing rate and mixing index at an equilibrium proposed by Rose. The results show that mixing index increases with inc

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
International Journal Of Recent Contributions From Engineering, Science & It
Smart Learning based on Moodle E-learning Platform and Digital Skills for University Students
...Show More Authors

Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More