Preferred Language
Articles
/
jeasiq-1854
REVIEWING THE IMPLICATIONS OF TRAINING FOR ACADEMIC ADMINISTRATION STAFF AT CENTRAL MICHIGAN UNIVERSITY
...Show More Authors

Training has an effect on employees’ performances. Accordingly, the person who is responsible for employees’ development must figure out the most effective way to train and develop employees. Central Michigan University (CMU) has recognized the importance of providing appropriate training for employees who have a duty in advising students. The reason is that these employees have a significant impact on students’ educational performances. Thus, special attention to this category of employees is needed to improve advising quality. This research attempted to explore the impact of training on academic advising at CMU. Face-to-face interviews and online surveys were used as data collection tools for this study. The study scope consisted of professional and administrative employees who provide academic advising for students and two employees who provide academic advising for students in the MSA department. The primary question asked, what are the impacts of training on academic advisors at CMU? From the data collection, we found out that training had a major role in increasing the performance of professional and administrative employees when they served in an academic advising capacity. However, there were obstacles that the employees believed should be addressed, including unequal chances to receive training, inconsistent training, a focus on certain skills while others were ignored, a lack of trainers, problems in scheduling enough training time, lack of resources for maintaining policy awareness. Thus, this study provided recommendations to eliminate the negative outcomes of those obstacles. we suggested applying practices such as performing needs assessment for employees, evaluating training outcomes, presenting equal opportunities for receiving training, and providing available resources for employees to stay updated on the policy.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Thu Feb 01 2024
Journal Name
Data In Brief
Factors affecting asphalt concrete permanent deformation: Experimental dataset for uniaxial repeated load test
...Show More Authors

Permanent deformation in asphalt concrete pavements is pervasive distress [1], influenced by various factors such as environmental conditions, traffic loading, and mixture properties. A meticulous investigation into these factors has been conducted, yielding a robust dataset from uniaxial repeated load tests on 108 asphalt concrete samples. Each sample underwent systematic evaluation under varied test temperatures, loading conditions, and mixture properties, ensuring the data’s comprehensiveness and reliability. The materials used, sourced locally, were selected to enhance the study ʼs relevance to pavement constructions in hot climate areas, considering different asphalt cement grades and con- tents to understand material variability ef

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Oct 22 2020
Journal Name
2020 4th International Symposium On Multidisciplinary Studies And Innovative Technologies (ismsit)
Artificial Intelligence in Smart Agriculture: Modified Evolutionary Optimization Approach for Plant Disease Identification
...Show More Authors

View Publication
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
American Journal Of Dermatology And Venereology
Sesame and Pumpkin Seed Oil are New Effective Topical Therapies for Alopecia Areata
...Show More Authors

KE Sharquie, AA Noaimi, MS Abass, American Journal of Dermatology and Venereology, 2019 - Cited by 4

View Publication
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
CdSe/CdS core/shell in polyacrylamide polymer matrix for Quantumdots Luminescent solar concentrator
...Show More Authors

Luminescent solar concentrator (LSC) are used to enhance       photoresponsivity of solar cell. The Quantumdots luminescent solar concentrator (QDLSC) consists of CdSe/CdS core/shell nanoparticles embedded in polyacrylamide polymer matrix positioned on the top surface of the silicon solar cell. This procedure improves the conversion efficiency of the bare silicon solar cell. The conversion efficiency of the solar cell has increased from 7.3% to 10.3%.  this improvement is referred to the widening of the response spectral region window  of the a- Si. Solar cell.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Lithology and minerals identification from well logs for Mishrif Formation in Ratawi oilfield
...Show More Authors

   Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id

... Show More
View Publication
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Heat And Mass Transfer
Hybrid heat transfer enhancement for latent-heat thermal energy storage systems: A review
...Show More Authors

View Publication
Scopus (275)
Crossref (281)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Apr 03 2025
Journal Name
Isa Transactions
Optimal hybrid type-3 fuzzy controller for horizontal axis wind turbines: Comparative study
...Show More Authors

The blade pitch angle (BPA) controller is key factor to improve the power generation of wind turbine (WT). Due to the aerodynamic structural behavior of the rotor blades, wind turbine system performance is influenced by pitch angle and environmental conditions such as wind speed, which fluctuate throughout the day. Therefore, to overcome the pitch angle control (PAC) problem, high wind speed conditions, and due to type-1 and type-2 fuzzy logic limitations for handling high levels of uncertainty, the newly proposed optimal hybrid type-3 fuzzy logic controller has been applied and compared since type-3 fuzzy controllers utilize three-dimensional membership functions, unlike type-2 and type-1 fuzzy logic controllers. In this paper six differen

... Show More
View Publication
Scopus Clarivate Crossref