Preferred Language
Articles
/
jperc-436
The Skills of Time Management and Causes of Wasting The Time of Heads of Department at University of Baghdad From The Staffers’ Point of View
...Show More Authors

            Time is very important in educational institutions. It is also one of our contemporary problem ‚as time is a clear – cut and limited factor‚ it demands that administrators should monitor it by administering and monitoring the principles of time.

Hence‚ the researcher attempts to identify the skills of administrating time and the reasons that cause the waste of time of the Heads of Departments at university of Baghdad.

Significance  of the research:

Time is very important to all educational administrators and one of them is the institutions of Higher education. One of these is the Head of the Department. S/He has to exploit time so as to run the department properly.

Aims of the research:

  • To identify the skills of administering time of the Heads of the Department in the collegesat university of Baghdad from the staffers’ points of view.
  • To identify causes of wasting the heads of department time.
  • There are statistical relationships between the skills of administering time and causes of wasting time according to (sex‚specialty‚ and years of work).

 Limits of the research:

  • All the staffers of the department in all colleges (scientific and humanity) at university of Baghdad.
  • All the colleges at university of Baghdad.
  • The academic year 2013 – 2014 .
  • Skills of administering time and causes of wasting time of the Heads of Department at university of Baghdad.

Procedure of the research:

The researcher used descriptive and analytical procedure. To achieve the aims of the present study‚ two questionnaires were designed. The firstquestionnaire consists of (63) items related to skills divided into five fields (planning‚ organization‚ orientation‚ organizational communicationand evaluation. The second one comprises (29) items that are related to causes of wasting time distributed in to two fields (external wasting and internal wasting).  The questionnaires were exposed to a jury of experts to check the validity of the questionnaires. Reliability is checked by using Cronbach Formula.Then the questionnaires were applied on (427) staffers‚ i.e. ‚ (11.99%) from the original population whichis(3559) from (12) colleges which are (Women’s college of Education‚Ibn Rushed college of Education‚ Mass Media‚Administration‚ Economy‚ ArtsandLanguage)

As for scientific college‚ they are ( Ibn Al- Haitham‚ Women’s college of Science‚ college of Science‚  Engineering‚ Pharmacy‚ AL- Khwarizmi Engineering).

         The researcher used SPSS to analyse the responses of the sample.

Results of the study:

  • Heads of the department enjoy a good level of skills of administering time‚according to the responses of the staffers which are statistically significant at (0‚05%).
  • Heads of the department do not suffer from waste of time.
  • There is no a direct relationshipbetween the skills of administering time and wasting it.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
New Fuzzy Normed Spaces
...Show More Authors

In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2021
Journal Name
مجلة بحوث الشرق الأوسط
PROPÓSITOS RETÓRICOS DE LA VOZ PASIVA EN EL NOBLE CORÁN Estudio comparativo entre dos versiones españolas الأغراض البلاغية لصيغة المبنى للمجهول فى القرآن الکريم «دراسة مقارنة بين ترجمتين للقرآن الکريم»
...Show More Authors

This research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 13 2023
Journal Name
Journal Of Survey In Fisheries Sciences
Spectrum Analyzing X-ray Data Image (FITS) Using Ds9 Program
...Show More Authors

n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
العلاقة بين نوعية حياة العمل والإبداع التنظيمي (بحث تطبيقي في ديوان وزارة التخطيط)
...Show More Authors

    يهدف البحث الحالي إلى اختبار العلاقة بين نوعية حياة العمل والإبداع التنظيمي في ديوان وزارة التخطيط ، ولبلوغ الهدف المذكور وبناء على معطيات البحث الاستطلاعي للباحث بني ألانموذج الفرضي للبحث الذي ضم المتغير المستقل والمعتمد، واعتماداً على حركية الأنموذج صيغت فرضيتان، ولاختبار صحة الفرضيات وجمع المعلومات من عينة البحث البالغة (100) مدير يمثلون مرك

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 21 2021
Journal Name
Recent Innovations In Chemical Engineering (formerly Recent Patents On Chemical Engineering)
Soap Production Using Vacuum Reactive Distillation: Batch Model
...Show More Authors

Introduction: Although soap industry is known from hundreds of years, the development accompanied with this industry was little. The development implied the mechanical equipment and the additive materials necessary to produce soap with the best specifications of shape, physical and chemical properties. Objectives: This research studies the use of vacuum reactive distillation VRD technique for soap production. Methods: Olein and Palmitin in the ratio of 3 to 1 were mixed in a flask with NaOH solution in stoichiometric amount under different vacuum pressures from -0.35 to -0.5 bar. Total conversion was reached by using the VRD technique. The soap produced by the VRD method was compared with soap prepared by the reaction - only method which

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref