The current research aims to test the impact of the strategy of merger (as an explanatory variable) in human resources management practices (as a response variable), and the importance of the subject being an important topic that mimics the Iraqi environment, where has seen many mergers that have not been addressed by former researchers in the field. In addition, the future prospects carry many mergers, and the problem of research was the lack of understanding among departments in how to manage the integration and deal with it, on the basis of scientific which reflected negatively on the practices of human resources management, and the research was based on two main hypotheses Six sub-hypotheses emerge to explore the correlation and influence between research variables by analyzing the answers of the research sample, which included sections managers and divisional officials (243) individuals, Data and information were collected using the questionnaire which included 54 items. The data were analyzed using statistical programs. The researcher adopted statistical methods (relative importance, arithmetic mean, standard deviation, Pearson correlation coefficient, simple linear regression). One of the most important conclusions of the research is the interest of the researched companies in the strategies of integration, when they aim to increase their interest in human resources management practices, especially when they use their interest in conflict management to promote their adoption of these practices. In addition, their interest in communication and organizational culture will work on automatic attention to human resources management practices.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreOne of the most common metabolic illnesses in the world is diabetes mellitus. This metabolic disease is responsible for a large percentage of the burden of kidney damage and dysfunction. The goal of this study was to look into the renal function of diabetic patients using metformin monotherapy who came to Mosul's Al-Wafaa diabetes care and research facility. During the period 1 January 2021 to 30 April 2021, 47 patients with T2DM (age 50.48 7.74 years) were enrolled in this case-control study. These patients' results were compared to a control group of 47 seemingly healthy people (age 45.89 9.06 years). All participants' demographic and medical histories were acquired through the delivery of a questionnaire. Blood samples were collected
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreIn this paper, a new class of non-convex functions called semi strongly (
The current study presents an experimental investigation of heat transfer and flow characteristic for subcooled flow boiling of deionized water in the microchannel heat sink. The test section consisted of a single microchannel having 300μm wide nominal dimensions and 300μm height (hydraulic diameter of 300μm). The test section formed of oxygen-free copper with 72mm length and 12mm width. Experimental operation conditions spanned the heat flux (78-800) kW/m2, mass flux (1700 and 2100) kg/m2.s at 31˚C subcooled inlet temperature. The boiling heat transfer coefficient is measured and compared with existing correlations. Also, the experimental pressure drop is measured and compared with microscale p
... Show MoreStrengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software. The aim of this research is to study experimentally and numerically, the beha
... Show MoreSome degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
Male reproductive health is intricately regulated by molecular and physiological processes, with the aryl hydrocarbon receptor (AhR) playing a crucial role. AhR is activated by various ligands and influences the onset and progression of diseases. The aim of this study was to evaluate the role of AhR on spermatogenesis in adult male rats were affected by resveratrol (RES) and CH223191, an AhR antagonist. The study include forty rats were randomly divided into four equal groups: Control group, DMSO group, RES group and AhR‾ group, the rats received respective treatments intraperitoneally twice weekly for 60 days, and various parameters related to male reproductive health were evaluated. The AhR that activation by the RES treatment w
... Show More