This research aims to clarify the role of Information Technology Competency (ITC) with dimensions' (IT Usage, IT Knowledge, and IT Operations) as an independent variable in the activation of Human Resources Management Practices (HRM Practices) as a dependent variable with dimensions' (Training and Development, Recruitment, Job Design, and Performance appraisal). Based on this, the correlation and effect relationships between the independent and dependent variables are determined by formulating two main hypotheses. There are a significant relationship and effect of IT competency with HRM practices within the dimensions. Furthermore, the scope and population of this research are the Informatics and Communications Public Company in Iraq. A quantitative design methodology was used to examine the relationships among variables of this research was used and the researcher adopted the descriptive-analytical approach. The questionnaire was distributed to a number of employees and managers (responders'), they were selected randomly and included 76 respondents. The statistical program (SPSS) was used to analyse the data through the use of statistical and descriptive methods such as mean, variation coefficient, and standard deviation, to analyze and describe data for correlation hypothesis testing, and simple linear regression coefficient to test impact hypothesis. The most important of conclusions to this study indicated that is a correlation among the HRM practices are related to IT competencies, Hence, there is an effective relationship positively between research variables.
Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreIn this work an approach has been developed to investigate the influence of surface roughness on thermohydrodynamic performance in aligned and misaligned journal bearings by considering an average flow model and deriving the shear flow factor for various roughness configurations, similar to the pressure flow factor. An average Reynolds equation for rough surfaces is defined in term of pressure and shear flow factors, which can be obtained by numerical flow simulation, though the use of measured or numerically generated rough surfaces. Reynolds, heat conduction and energy equations are solved simultaneously by using a suitable numerical technique (Finite Difference Method) to obtain the pressure and temperature di
... Show MoreThis study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAfter about twelve months or maybe more, some people can’t achieve pregnancy. This might be a sign of infertility as a reproductive system disease. The following study was carried out to investigate the DAZ 1 gene methylation level and its association with azoospermia in Iraqi patients. One hundred and fifty human blood samples were collected from from different regions in Baghdad governorate, including (private medicals Labs and the high institute for infertility diagnosis assisted reproductive techniques and Kamal Al- Samara'ay IVF Hospital) from both fertile and infertile men. The control group consists of 50 samples ranging from 22 to 51 years old, while the patient (infertile group) consists of 100 samples ranging between 25 and 51 y
... Show MoreIn the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show MoreRenewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te
... Show MoreConstruction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio
... Show MoreObjective: To study the protective eff ects of cinnamic acid on dextran sodium sulfate (DSS) induced ulcerative colitis (UC) in mice. Materials and methods. Forty adult male mice were randomLy divided into fi ve groups, control group, an induction group received 3% DSS in drinking water for 7 consecutive days. Two treatment groups received oral suspension of cinnamic acid 50 and 25 mg/kg, respectively and 3% DSS in drinking water, for 7 consecutive days. The fi nal group received oral suspension of cinnamic acid 50 mg/kg for the latter 7 days without DSS in drinking water. All the animals were euthanized on day eight. The colon of animals was extracted and divided into two sections, the middle was homogenized and biochemically analy
... Show More