Preferred Language
Articles
/
jpgiafs-315
Analysis of the requirements of electronic management and its role improving The performance of human resources: Applied research at Iraqi general insurance company
...Show More Authors

The study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.

 The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and divisional officials) and staff of the Human resources Management Section. The researcher adopted the analytical descriptive approach, and the data were processed and analyzed using the statistical program (SPSS) through the application of statistical methods (arithmetic mean, standard deviation, coefficient of difference, relative importance, Pearson correlation coefficient (person) and simple linear regression).

The researcher has reached the results of the analysis that the higher the proposed e-management requirements, the more result the E-management application in the company more successfully and attract qualified human competencies leads to a successful shift towards the application of e-management of human resources In addition to providing the required financial support, and the involvement of staff in training courses in administrative systems, with moral and financial motivation.

The most important recommendations focused on the dissemination of awareness and e-culture among employees of the importance of applying e-governance to the Iraqi general Insurance company for its psychological impact on the acceptance of modern technological changes, and the development of awareness-raising plans and programs for the target groups and employees of the company. With the development, Alternative plans for E-departments to be used in a timely manner, and to prepare effective training and qualification plans for management leaders on the need to move towards e-governance.    

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (230)
Crossref (230)
Scopus Clarivate Crossref
Publication Date
Sun Oct 22 2023
Journal Name
مجلة الدراسات المستدامة
Strategies, Techniques and Activities Used by English Language Teachers in Employing Online Teaching
...Show More Authors

Publication Date
Tue Aug 16 2022
Journal Name
جامعة بغداد/ كلية التربية للعلوم الصرفة - ابن الهيثم
أثر استراتيجية التدريس البصري باستخدام الانـفوجرافيك في التحصيل والتفكير البصري لدى طلاب المرحلة المتوسطة فـي مادة الرياضيات
...Show More Authors

أثر استراتيجية التدريس البصري باستخدام الانـفوجرافيك في التحصيل والتفكير البصري لدى طلاب المرحلة المتوسطة فـي مادة الرياضيات

Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
Problemas en la Traducción de la Fraseología del Español al Árabe en el Texto Literario ( Un Estudio Comparativo desde el Punto de Vista Traductológico)
...Show More Authors

Problems in the Translation of Spanish phraseology to Arabic in the Literary Text (A Comparative Study from the Perspective translatological)

 

Abstract

One of the most common problems facing the translator is the identification and subsequent search for correspondences of phraseological units. The importance of the phraseological competence in a foreign language is widely recognized by many authors (Howarth, Corpas Pastor, Pamies Bertran, to name a few).

We must lose our fear to recognize that the domain of the phraseology is the highest level of command of any language. The objective of the present study is to clarify the differences in UFS Spanish to Arabi

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Languages (jcl)
From Personal Issues to National Concerns: A Study in E.M Forster’s Where Angels Fear to Tread & Howards End
...Show More Authors

            E.M. Forster (1879-1970) is one of the important novelists who dealt with the personal and social lives of the people in England during the early beginning of the twentieth century. During his literary career, he developed gradually his views about man and his position in society.

 In his first novel, Where Angels Fear to Tread (1902), the focus is laid on local and personal issues in the lives of the characters. It is limited to the relations between neighbours in small communities. Though the setting is shifted to Italy, Forster does not make full use of this shift to present cultural or racial conflicts; rather he limits his plot to the private tr

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 المسائل المتعلقة بالأسماء الثابتة لله (عزوجل) الواردة في (مرعاة المفاتيح شرح مشكاة المصابيح، لأبي الحسن المباركفوري (ت1414هـ).
...Show More Authors

The research deals with the issues related to the fixed names of God U, which are from a set of issues mentioned in the Book of Observations of the Keys Explaining the Mishkat al-Masbah by Abu Al-Hasan Al-Mubarakfory (d. 141 AH). It included five demands: the first of them is in proving and identifying the most beautiful names and divisions of God, and the second in the name, name and name. And the third: It was in their number, while the fourth: in deriving the names, is it suspensive or not? And Fifth: The Compilation of Allah’s Most Beautiful Names.

View Publication Preview PDF