Preferred Language
Articles
/
jpgiafs-315
Analysis of the requirements of electronic management and its role improving The performance of human resources: Applied research at Iraqi general insurance company
...Show More Authors

The study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.

 The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and divisional officials) and staff of the Human resources Management Section. The researcher adopted the analytical descriptive approach, and the data were processed and analyzed using the statistical program (SPSS) through the application of statistical methods (arithmetic mean, standard deviation, coefficient of difference, relative importance, Pearson correlation coefficient (person) and simple linear regression).

The researcher has reached the results of the analysis that the higher the proposed e-management requirements, the more result the E-management application in the company more successfully and attract qualified human competencies leads to a successful shift towards the application of e-management of human resources In addition to providing the required financial support, and the involvement of staff in training courses in administrative systems, with moral and financial motivation.

The most important recommendations focused on the dissemination of awareness and e-culture among employees of the importance of applying e-governance to the Iraqi general Insurance company for its psychological impact on the acceptance of modern technological changes, and the development of awareness-raising plans and programs for the target groups and employees of the company. With the development, Alternative plans for E-departments to be used in a timely manner, and to prepare effective training and qualification plans for management leaders on the need to move towards e-governance.    

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تحديات فاعلية سلسلة التجهيز بإشارة خاصة للشركات العالمية الكبرى
...Show More Authors

توطئة

ظهر اهتمام متزايد في إدارة سلسلة التجهيز (Supply Chain Management) خلال الأعوام العشرين الماضية، بوصفها مصدراً ثرياً للتنافسية (Competitiveness) وخلق القيمة (Value Creation). ولقد جاء هذا التطور بفعل موجتين من التطور: الأولى، تمثلت بزيادة التوجه نحو التوريد الخارجي الستراتيجي (Strategic Outsourcing) كرؤية للشركات بأن تصبح سريعة جداً بالتركيز على

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تداعيات الأزمة المالية على أداء الاستثمار الأجنبي المباشر: دراسة حالة : تونس – الجزائر
...Show More Authors

تهدف الدراسة إلى معالجة مشكلة تداعيات الأزمة المالية العالمية على أداء الاستثمار الأجنبي المباشر لكل من تونس والجزائر، ومن خلال ما يفرضه النظام العالمي المعولم فانه من المؤكد أن الاستثمارات الأجنبية المباشرة لدول الدراسة ستتأثر سلبا بهذه الأزمة لكن بدراجات متفاوتة نظرا لخصوصية كل اقتصاد ودرجة ارتباطه بالاقتصاد العالمي . وقد خلصت الدراسة إلى أن الأزمة المالية العالمية غيرت خارطة توزيع الاستثمارات الأجنب

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Nibal
يعتبر الاتصال وسيلة هادفة من الوسائل الرئيسية التي تستخدمها المنظمة الإدارية في تحقيق أهدافها إذ أن جميع العاملين يتعاملون مع بعضهم البعض من خلال وسائل الاتصال المختلفة من أجل ضمان تسيير نشاطاتهم وتحقيق أهدافهم وهذا يدل على أن الاتصال يعتبر الوسيلة الاجتماعية التي يحقق الأفراد من خلالها سبل التفاهم والتفاعل البناء
...Show More Authors

Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l