هدفت هذه الدراسة إلى التعرف على دور نظام معلومات الموارد البشرية في تحقيق متطلبات عملية تقويم أداء أعضاء الهيئة التدريسية في كلية الإدارة والاقتصاد/جامعة بغداد. وقد تحددت مشكلة الدراسة في عدد من التساؤلات، أهمها: ما تأثير كل متغير من متغيرات نظام معلومات الموارد البشرية في عملية تقويم أداء أعضاء الهيئة التدريسية في الكلية المبحوثة؟ وما تأثير متغيرات نظام معلومات الموارد البشرية مجتمعة في عملية تقويم الأداء في الكلية المبحوثة؟. ومن أجل تحقيق هدف الدراسة، والإجابة عن تساؤلات المشكلة جرى تطبيقها على عينة مكونة من (14) تدريسياً من القيادات الإدارية والعلمية، فضلاً عن الباحث، وذلك لملئ (قائمة الفحص) التي تعدّ أداة الدراسة الرئيسة في جمع البيانات والمعلومات إلى جانب الوثائق والسجلات والمقابلات الشخصية والمعايشة الميدانية. وخلصت الدراسة إلى جملة من الاستنتاجات كان الأبرز منها: أن متغيرات نظام معلومات الموارد البشرية تؤثر في عملية تقويم أداء أعضاء الهيئة التدريسية، لاسيما عندما تعمل هذه الأبعاد بشكل متكامل. إن لمتغيرات نظام معلومات الموارد البشرية تأثير في عملية تقويم أداء أعضاء الهيئة التدريسية في الكلية المبحوثة، إذ كان التأثير واضحاً لجميع المسارات، إلا أن المسار المبتدئ (بالرواتب-التوظيف-الحوافز-التدريب والتطوير والبحث العلمي-الصحة والسلامة) كان الأكثر تأثيراً. وأوصت الدراسة بضرورة الأخذ بمسار (الرواتب-التوظيف-الحوافز-التدريب والتطوير والبحث العلمي-الصحة والسلامة) عند القيام بتقويم أداء أعضاء الهيئة التدريسية في الكلية المبحوثة، لأنه المسار الأكثر تأثيراً في زيادة موضوعية تقويم أداء أعضاء الهيئة التدريسية. وضرورة تفعيل دور نظم معلومات الموارد البشرية في خلق ذاكرة منظمية نشطة وحية تحتفظ بالسجل المهاري لأعضاء الهيئة التدريسية من أول أيامهم الوظيفية لحين الحاجة لتقويم أدائهم، ولعل بناء نظام فاعل يسهم في استحضار المعلومات اللازمة لعملية تقويم أداء أعضاء الهيئة التدريسية بعيداً عن التقويم العاطفي الذي لا يستحضر كل مفردات التقويم على وفق الأسس العلمية.
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Ag2O (Silver Oxide) is an important p-type (in chasm to most oxides which were n-type), with a high conductivity semiconductor. From the optical absorbance data, the energy gap value of the Ag2O thin films was 1.93 eV, where this value substantially depends on the production method, vacuum evaporation of silver, and optical properties of Ag2O thin films are also affected by the precipitation conditions. The n-type and p-type silicon substrates were used with porous silicon wafers to precipitate ±125 nm, as thick Ag2O thin film by thermal evaporation techniques in vacuum and via rapid thermal oxidation of 400oC and oxidation time 95 s, then characterized by measurement of
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
In recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MoreData-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThe necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
... Show MoreIn this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
Atorvastatin calcium (ATR) is an antihyperlipidemic agent used for lowering blood cholesterol levels. However, it is very slightly soluble in water with poor oral bioavailability, which interferes with its therapeutic action. It is classified as a class II drug according to Biopharmaceutical Classification System (low solubility and high permeability).
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More