Objective: To evaluate the psychological work environment's effect on the workers’ productivity in Baghdad
City industries at Al-Rusafa and Al-Karkh Sectors.
Methodology: A descriptive evaluation design is employed throughout the present study from May 25th 2012
through January 7
th
, 2014. A purposive (non probability) sample is selected for the study which includes (500)
workers from industries at AL-Russafa and AL-Kerch sectors in Baghdad City. A questionnaire is constructed to
gather data which may assist to achieve the objective of the study. Content validity of the instrument is
determined through eliciting the opinions of a panel of (10) experts and the reliability through a pilot study by
using internal consistency reliability which is determined through the computation of the Cronbach alpha
correlation coefficient of the scale on data gathered from workers. Data are analyzed through the application
of descriptive statistical data analysis procedures of frequency, percentage, mean, weighted mean and
standard deviation and inferential statistical data analysis procedures of Cronbach alpha correlation coefficient,
relative sufficiency, and multiple regression.
Results: The findings depict that the psychological work environment is manifested as greatly psychological
problem creating one (43%); moderately psychological problem creating environment (49.4%) and problem
free environment. The vast majority of the workers has unfortunately experienced moderate (60.2%) and low
(38.8%) levels of productivity as a result of the influence of its indicators.
Recommendations: The study recommends that Occupational–oriented health education program with
emphasis on psychological work environment, and its impact upon workers’ productivity can be constructed
and implemented for workers on a wide-range scale. Further research can be conducted on large sample size
and nation-wide.
<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t
... Show MoreThe concept of epiform modules is a dual of the notion of monoform modules. In this work we give some properties of this class of modules. Also, we give conditions under which every hollow (copolyform) module is epiform.
The main aim of this paper is to introduce the concept of a Fuzzy Internal Direct Product of fuzzy subgroups of group . We study some properties and prove some theorems about this concept ,which is very important and interesting of fuzzy groups and very useful in applications of fuzzy mathematics in general and especially in fuzzy groups.
To move forward on the path of goodness and peace, we must realize that, in the midst of the great diversity of cultures and forms of human life in the world, that we form one human nation, which God Almighty created to worship Him on His earth and under His heavens and to enjoy His bounties and natural resources that God Almighty has bestowed upon that nation. On one land, and it is governed by one common destiny. Every country has been endowed with a natural resource by God Almighty that distinguishes it from the other country to live in prosperity if these wealth are distributed equally among the members of the same society and societal justice is achieved. We must join together to work for the establishment of a sustainable global commu
... Show MoreThe aim of this paper is to introduce a new type of proper mappings called semi-p-proper mapping by using semi-p-open sets, which is weaker than the proper mapping. Some properties and characterizations of this type of mappings are given.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
in this paper the notion of threshold relations by using resemblance relation are introduced to get a similarity relation from a resemnblance relation R
It is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show More