This research aims to know the reality of succession planning in the researched organization and how it occupies the important jobs in the organization and its readiness for sudden and urgent events that lead to the vacancy of these jobs, and the importance of this research is that it is one of the rare Arab and Iraqi studies and research in this field, as it is one of the first researches It deals with the reality of succession planning in light of the retirement law No. (26) of 2019, and the research problem was the absence of consecutive planning programs and the weak preparation of suitable candidates to face sudden and urgent conditions as replacements for current leaders who occupy the leading and key positions in the department The Medical City, as the research sample included all the directors of the departments in the General Administration / Medical City Department, who numbered (8) eight department directors, and who nominated (29) twenty-nine candidates for the succession planning program to fill the positions of the departments administration in the event of their vacancy in the future, and The researcher has adopted the case study approach for the possibility of collecting more than one research method at one time, and data was collected using a personal and job information form and a performance evaluation form, in addition to questions of personal interviews and observation during field coexistence as well as official documents obtained during local visits It is used for the organization, and the data has been analyzed through the Excel program, and some statistical methods such as (the arithmetic mean and the percentage) have been used to analyze the data of the candidates, and the most prominent results that the researcher reached is the absence of succession planning programs that explain how to occupy the leading, key and critical positions In anticipation of any emergency event in the research organization, as well as the presence of candidates who have high performance ratings between (good and excellent) that qualify them for future management positions as successors to current managers
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe results show that the compound affects the rest of the living cells after treatment for 15 minutes The influence Almtafr has had the effect BU less than the effect of NTG in the case of the registration of every of Struptomaysan resistance and rifampicin, although the first attribute more responsive
Autorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.
A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)