Preferred Language
Articles
/
jpgiafs-1007
Economic perspectives on employment 2021-2030
...Show More Authors

Long before the pandemic, labour force all over the world was facing the quest of incertitude, which is normal and inherent of the market, but the extent of this quest was shaped by the pace of acceleration of technological progress, which became exponential in the last ten years, from 2010 to 2020. Robotic process automation, work remote, computer science, electronic and communications, mechanical engineering, information technology digitalisation o public administration and so one are ones of the pillars of the future of work. Some authors even stated that without robotic process automation (RPA) included in technological processes, companies will not be able to sustain a competitive level on the market (Madakan et al, 2018). Robots and automation make processes to operate automatically, especially those which are repetitive, emerging a new concept, o robotic workforce.

            Prominent empirical studies (Frey and Osborne, 2017 and Acemoglu and Restrepo, 2017) prove that continuous progress in digital and robotic technologies shape a trend towards the demise of work. Prospects of a future where many people will not have jobs due to automation are enhanced by additional publications (Brynjolfsson and McAfee, 2014, Ford, 2015). Automation and the complementary digital technology might come along with unemployment and conversely with inequality, hence the fear of people for what will bring the future. Social and economic policies are to be implemented, such as education for new adaptive skills or, in the worst scenarios, provision of a basic income. Despite of this unsecure perspective, automation processes come in hand with some peculiar qualities: they free people of repetitive tasks, provide availability of 24/7, are convenient and helpful, escape from risky jobs from dangerous situation, bust workflow inefficiencies, shore up productivity. These all are nowadays pillars of further growth, which economic mainstream still supports.

Nevertheless, in line with continuous extension of capitalism, work didn’t cease to expand too, occupying workers lives due to new and diversified needs. At the beginnings of capitalism, in the early nineteenth century, the working hour programs were devastating people, from children to elders, forced to work up to exhausting levels, or death sometimes, due to low standard living (Heillbronner, 2005). Until the beginning of twentieth century, thanks to greater productivity and better social and economic policies, the decline of working hours improved the general background of the workforce. Despite of the solid trend improving the life of workers in the expense of working ours, from 1970s the trend has reversed, with a starting point in the United States (Friedman, 2017). Furthermore, in the twentieth century the productivity in United States improved 15 times, and in Europe 18 times, but the working hours has barely halved. Henceforth, a paradox is rising between the general growth efficiency and productivity and the expanding working our program (Spencer, 2018). Historical expectations of high quality of life with abundance and spare time seem to last more to be achieved. More, along with this economic paradox, non-cyclical crisis such as Covid-19 pandemic, decrease more the chances of a restless future for the workforce.

This paper offers a critical perspective on the present debate of the future of work, under the provocative context of automation and the unexpected pandemic and its consequences. This debate is targeting economics and social aspects which are colliding in order to identify what is the best template to accept a provocative future with a reality far out our possibility to foreseen. It illustrates, in general, how the idea of online or remote work will face the future of employment, and presents, in particular, what are the short run policies we should to access to get back on track. The paper contributes by setting out some of the main positions in the debate of disruptions brought by pandemic.

The Paper is organised as follows. Section two offers some metrological hints on the research and scientific outcomes. Section three discusses issues on historical background on the vision of the reducing of working time. This discussion helps to identify limits in economic thinking and the origin of the ideas in context. Section four draws out the area of automation and its consequences. Section five reflects on the opportunities for changing educational paradigm after pandemic. Section six concludes.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Adsorption Study for Trifluralin on Iraqi ? –Alumina
...Show More Authors

Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Effect of Ochratoxin-A on Mouse Embryos
...Show More Authors

This study sought to determine malformation caused by Ochratoxin-A (OTA) on mouse embryos. Twenty adult female white Swiss mice (mus msculus) were divided into four groups, with five females per group, and with one male placed with two females in a cage. Avaginal plug was observed in the early morning and the day of mating was considered as day of pregnancy followed by the first day of pregnancy. Three sub lethal concentrations of OTA were applied to the respective groups (other than the control), 1mg/kg, 2mg/kg and 4mg/kg. The animals were given 0.1 ml per 10 gm body weight per concentration of OTA once a day during days 7-14 of pregnancy. The control group animals were given distilled water. The pregnant mice were dissected, and the embry

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Simulation on Rotation Curve of Spiral Galaxies
...Show More Authors
Abstract<p>The problem of dark matter in galaxies is still one of the most important unsolved problems in the contemporary extragalactic astronomy and cosmology. The existence of a significant dynamic difference between the visible mass and the conventional mass of galaxies firmly establishes observational result. In this paper an unconventional explanation will be tested as an alternative to the cold dark matter hypothesis; which is called the modified Newtonian dynamics (MOND).</p><p>In this paper covers the simulation of galactic evolutions; where the two hypotheses are tested via the rotation curves. N-body simulation was carried adopting different configuration lik</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Apr 06 2017
Journal Name
Global Journal Of Engineering Science And Researches 4(2348-8034):48-52
ON SEMI-STRONG (WEAK)CJ-TOPLOGICAL SPACES
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Tolerance and its impact on building society
...Show More Authors

Tolerance and its impact on building society

View Publication Preview PDF