Preferred Language
Articles
/
jpgiafs-315
Analysis of the requirements of electronic management and its role improving The performance of human resources: Applied research at Iraqi general insurance company
...Show More Authors

The study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.

 The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and divisional officials) and staff of the Human resources Management Section. The researcher adopted the analytical descriptive approach, and the data were processed and analyzed using the statistical program (SPSS) through the application of statistical methods (arithmetic mean, standard deviation, coefficient of difference, relative importance, Pearson correlation coefficient (person) and simple linear regression).

The researcher has reached the results of the analysis that the higher the proposed e-management requirements, the more result the E-management application in the company more successfully and attract qualified human competencies leads to a successful shift towards the application of e-management of human resources In addition to providing the required financial support, and the involvement of staff in training courses in administrative systems, with moral and financial motivation.

The most important recommendations focused on the dissemination of awareness and e-culture among employees of the importance of applying e-governance to the Iraqi general Insurance company for its psychological impact on the acceptance of modern technological changes, and the development of awareness-raising plans and programs for the target groups and employees of the company. With the development, Alternative plans for E-departments to be used in a timely manner, and to prepare effective training and qualification plans for management leaders on the need to move towards e-governance.    

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
المعتقدات الصحية وعلاقتها بفاعلية الذات لدى طلبة الجامعة
...Show More Authors

Off by the idea of ​​health beliefs to promote health and conservation. It occupies beliefs health and health behavior and development of growing importance, not in terms of physical health, but also in terms of mental health also so highlights the importance of beliefs health through raising awareness of social health and contribute to the Carissa most dangerous enemy facing human not a disease, as well as focus on the role of the individual in personal responsibility for his health because this will result to be aware of the risk factors and address them early and disease prevention and physical ills and improve mental state and then to maintain overall health.

According to

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
الازمة المالية العالمية
...Show More Authors

كنا ولا نزال نقرأ عن انهيار اسهم بورصة وول ستريت في نيويورك عام 1929 لكننا لم نعايش ذلك الحدث الاقتصادي الكبير، اما الان فإننا نرى ونسمع ونحس بتداعيات هذه الازمة المالية بل الاقتصادية العالمية الحالية.

وهذه الشرارة التي كانت بدأت قبل حوالي 80 عاماً ها هي تعيد نفسها اليوم وتبدأ من نفس المكان- بورصة وول ستريت في نيويورك.

واذا كنا قرأنا عن انهيار نظام برتن- وودز بعد الحرب العالمية الث

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Finite Element Investigation on Shear Lag in Composite Concrete-Steel Beams with Web Openings
...Show More Authors

In this paper, effective slab width for the composite beams is investigated with special emphasis on the effect of web openings. A three dimensional finite element analysis, by using finite element code ANSYS, is employed to investigate shear lag phenomenon and the resulting effective slab width adopted in the classical T-beam approach. According to case studies and comparison with limitations and rules stipulated by different standards and codes of practice it is found that web openings presence and panel proportion are the most critical factors affecting effective slab width, whereas concrete slab thickness and steel beam depth are less significant. The presence of web opening reduces effective slab width by about 21%.

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Education College Wasit University
تقصي فاعلية التعليم الالكتروني خلال فيروس كورونا المستجد (كوفيد 19) في كلية التربية للبنات/ جامعة بغداد
...Show More Authors

      تبنت العديد من المؤسسات الأكاديمية التعلم الإلكتروني منذ سنوات ، وقد أثبت فاعليته في كثير من هذه المؤسسات لاسيما تلك المهتمة بتعلم اللغات الاجنبية. الا انه  مع انتشار جائحة كورونا اصبح التعليم الالكتروني  ضرورة ملحة في الجامعات في جميع أنحاء العالم ، بما في ذلك الجامعات العراقية.  تهدف الدراسة الحالية إلى تقصي أثر هذا الوباء على التعلم الإلكتروني في أحدى الكليات العراقية . يفترض الباحث أن تقبل ال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
مجلة دراسات محاسبية ومالية
المهارات الادارية ودورها في تعزيز التفوق التنافسي للشركات
...Show More Authors

يحاول البحث ان يكشف كيفية التحكم والسيطرة على التفوق التنافسي للشركات عن طريق بناء المهارات الادارية في المستويات التنظيمية المختلفة لذا يهدف البحث الى معرفة طبيعةعلاقةالمتغير الرئيس الاول الذي يتمثل بالمهارات الادارية وهي المهارات الفنية والمهارات الانسانية والمهارات الفكريةمع المتغير الرئيس الثاني الذي يتمثل بالتفوق التنافسي، وذلك عن طريق التطبيق الميداني في الشركة العامة للصناعات الانشائية واخ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 04 2009
Journal Name
Journal Of Educational And Psychological Researches
علاقة فاعلية الذات والفرع الأكاديمي بدافع الإنجاز الدراسي لدى طالبات كلية عجلون الجامعية
...Show More Authors

هدفت هذه الدراسة إلى التعرف على علاقة فاعلية الذات والفرع الأكاديمي بدافع الإنجاز الدراسي لدى طالبات كلية عجلون الجامعية. تكونت عينة الدراسة من (200) طالبة ممن درسن في أحد الفرعين العلمي أو الأدبي اختيرت بالطريقة الطبقية العشوائية، وشكلت ما نسبته 10% من مجتمع الدراسة.

ولتحقيق أهداف الدراسة تم تطبيق مقياس فاعلية الذات على عينة الدراسة، كما تم تطبيق مقياس دافع الإنجاز الدراسي على العينة نفسها

... Show More
View Publication Preview PDF