Preferred Language
Articles
/
jpgiafs-315
Analysis of the requirements of electronic management and its role improving The performance of human resources: Applied research at Iraqi general insurance company
...Show More Authors

The study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.

 The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and divisional officials) and staff of the Human resources Management Section. The researcher adopted the analytical descriptive approach, and the data were processed and analyzed using the statistical program (SPSS) through the application of statistical methods (arithmetic mean, standard deviation, coefficient of difference, relative importance, Pearson correlation coefficient (person) and simple linear regression).

The researcher has reached the results of the analysis that the higher the proposed e-management requirements, the more result the E-management application in the company more successfully and attract qualified human competencies leads to a successful shift towards the application of e-management of human resources In addition to providing the required financial support, and the involvement of staff in training courses in administrative systems, with moral and financial motivation.

The most important recommendations focused on the dissemination of awareness and e-culture among employees of the importance of applying e-governance to the Iraqi general Insurance company for its psychological impact on the acceptance of modern technological changes, and the development of awareness-raising plans and programs for the target groups and employees of the company. With the development, Alternative plans for E-departments to be used in a timely manner, and to prepare effective training and qualification plans for management leaders on the need to move towards e-governance.    

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Designing an E-marketing Website for Sustainable Fashion: صيته بنت محمد المطيري .....بشاير يوسف التويجري .....روان يوسف العلي....شهد عبد الحكيم المقرن
...Show More Authors

The importance of websites appears as a modern tool that helps people connect with each other and exchange information rapidly. An increase number of new websites have been created in public or private spheres, which benefit individuals and society as a whole. This research aims to design a website specialized in marketing sustainable fashion that meets the needs of the Saudi market. It followed a descriptive and analytical approach. A survey has been conducted on a random sample of e-marketing users. The sample number is 101 users. The study resulted in: Determining the effectiveness of e-marketing, studying consumer purchasing tendencies, and designing a website for sustainable fashion based on the survey’s results. The study recomme

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Al-kindy College Medical Journal
Urinary Tract Infection Risk Assessment By Non- Thermal Plasma In Iraqis Patients
...Show More Authors

Background: In the present study used device jet plasma needle with atmospheric pressure which  generates non thermal plasma jet to measure treatment potent with plasma against pathogenic bacteria  founded  in UTI  was inactivated with plasma at 10 sec,

Objective:. This work included the application of the plasma produced from the system in the field of bacterial sterilization , where sample of Gram- negative bacteria (Escherichia coli) were exposed to intervals (1-10)second . Midstream Urine samples swabs were obtained from patients with urinary tract infections.

Type of the study: Cross -sectional study.

Methods: The work were used i

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
تناول البحث تطورات بنية الانفاق الحكومي للمدة (1990-2014) اذ تشمل هذه المدة مدتين مختلفتين من حيث الظروف اذ اتسمت المدة الاولى (1990-2002) بفرض العقوبات الاقتصادية وحرمان الاقتصاد العراقي من المورد النفطي ,في حين اتسمت المدة الثانية (2003-2014) بوفرة ال
...Show More Authors

  The research explain the developments in the structure of government Expenditure for the period (1990-2014), this period include tow different periods in terms of the conditions, the first period (1990-2002)characterized by imposing the economic sanctions and deny the Iraqi economy from the oil revenues, while the second period (2003-2014) marked by abundance resource rents as a result of lifting the ban on oil exports, (autoregressive Distributed lag Model) has been used to measure the impact of government Expenditure in both side current and investment in the oil-GDP (gross domestic product) and non oil-GDP, the stady found that there is no significant relationship between current Expenditure in non-oil and oil-GDP in bo

... Show More
View Publication
Crossref
Publication Date
Sun Jan 03 2021
Journal Name
مجلة كلية التراث الجامعة
قياس وتحليل الاستدامة المالية للاقتصاد العراقي للمدة ٢٠٠٤-٢٠١٨
...Show More Authors

ان تحليل السلاسل الزمنية من المواضـيع الهامة في تفسير الظـواهر التي تحدث خلال فترة زمنية معينة ان الهدف من هذا لتحليل هو الحصـول على وصف وبنـاء أنموذج مناسب من اجل اعطاء صورة مستقبلية واضحة للسلاسل الزمنية المدروسة وان السلاسل الزمنية اهم الادوات المستخدمة في بناء وتقدير والتنبؤ بالظواهر المختلفة وان الاستدامة المالية هي الحالة التي تكون فيها الدولة قادرة على الوفاء بالتزاماتها الحالية والمستقبلية من غير

... Show More
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تحديات فاعلية سلسلة التجهيز بإشارة خاصة للشركات العالمية الكبرى
...Show More Authors

توطئة

ظهر اهتمام متزايد في إدارة سلسلة التجهيز (Supply Chain Management) خلال الأعوام العشرين الماضية، بوصفها مصدراً ثرياً للتنافسية (Competitiveness) وخلق القيمة (Value Creation). ولقد جاء هذا التطور بفعل موجتين من التطور: الأولى، تمثلت بزيادة التوجه نحو التوريد الخارجي الستراتيجي (Strategic Outsourcing) كرؤية للشركات بأن تصبح سريعة جداً بالتركيز على

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref