The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Objective(s): to assess the effectiveness of educational program on nurses' knowledge concerning the side
effects of chemotherapy among children with leukemia.
Methodology: A descriptive analytic (quasi – experimental) design study was carried out at Baghdad City from
2
nd of October to 27th of June 2015. Non-probability sample of (35) male and female nurses was selected from
the Oncology Wards in Children Welfare, Child's Central and Baghdad Teaching Hospital. The study
instruments consisted of two major parts to meet the purposes of study. The first part is related to nurses'
demographic characteristics and the second part (four domains) is related to nurses' knowledge concerning the
side effects of chemothera
Hemogloin (Hb) and serum ferritin levels are used to assess anemia in pregnancy. Some studies referred to the influence of maternal age, body mass index (BMI) and parity on Hb and serum ferritin levels. The study aimed to examine the possible association of maternal Hb and serum ferritin with maternal age, parity, and BMI in a sample of pregnant women in Baghdad.
Ninety healthy pregnant women, grouped in three equal groups according to the pregnancy trimester, and thirty apparently healthy non-pregnant women from Baghdad were enrolled in this observational study. Blood and serum samples were obtained for the estimation of Hb and serum ferritin levels.
The pooled data of participants showed a n
... Show MoreIn Present study, 25 clinical isolates of Proteus spp. of clinical samples, urine, wounds and burns collected from different hospitals in Baghdad city, all isolates were identified as Proteus mirabilis using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifying as P. mirabilis. The susceptibility of P. mirabilis isolates to cefotaxime was 66.6 %, while to ceftazidime was 20%. Extended spectrum β-lactamses producing Proteus was 30.7 %. DNA of 5 isolates of P. mirabilis was extracted and detection for blaVEB-1 gene by using multiplex polymerase chain reaction (PCR). Results showed that the presence of this gene in all tested isolates, as an important indicator for increas
... Show MoreThis study included an analysis of three stations (Al Dora, Al Za'franiya, and Arab Ejbur) chosen to study the Physiochemical and microorganism (Fungi and Bacteria) loud of the Tigris River in the southern section of Baghdad city. The result of this research shows that the highest temperature recorded in summer in Al Za'franiya was 37Co, while the lowest temperature recorded in winter in Al Dora was 9Co. and the value of pH recorded the highest in summer it was 7.9 in Arab Ejbur, and the lowest value was in winter 7.1 in Al Dora regions, While Total Organic Carbon (TOC) shows the highest values found in the summer was 6.7 Mg L-1in Al Za'franiya Samples, and the lowest values were 2.0 Mg L-1in Arab Ejbur during the winter. The more f
... Show More