هدف البحث الى بيان طبيعة ارتباط والتأثير بين الضغوط التنافسية (المتغير المستقل) والتجديد الاستراتيجي (المتغير التابع) ، تم تطبيق البحث في فنادق الدرجة الممتازة في بغداد. وبلغت عدد افراد عينة البحث (99) مديراً يعملون في (6) فنادق من الدرجة (الممتازة) ببغداد، وهي (فندق الرشيد، فندق عشتار، فندق ميريديان، فندق المنصور، فندق بابل، وفندق بغداد) وتم اجراء التحليل الاحصائي باستخدام البرنامج الاحصائي AMOS وظهرت وجود تنافسية عالية بشأن الخدمة التي تقدمها الفنادق من وجهة نظر المبحوثين ، وهناك ارتباط وتأثير للضغوط تنافسية في التجديد الاستراتيجي ، وان يولي المديرين اهتماماً استثنائياً بموضوعات (الضغوط التنافسية والتجديد الاستراتيجي) وينبغي تضمينها في توجهاتهم الاستراتيجية ، و وكانت الاستبانة هي الاداة الرئيسة لجمع البيانات من المستجيبين، توصل البحث الى عدد من النتائج ، من ابرز النتائج وجود علاقة ارتباط ذات دلالة احصائية معنوية بين الضغوط التنافسية والتجديد الاستراتيجي ، فضلا عن وجود تأثير للضغوط التنافسية في التجديد الاستراتيجي على المستوى الكلي وعلى مستوى الابعاد الفرعية
Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising technology for a wide range of ocean monitoring applications. The UWSNs suffer from unique challenges of the underwater environment, such as dynamic and sparse network topology, which can easily lead to a partitioned network. This results in hotspot formation and the absence of the routing path from the source to the destination. Therefore, to optimize the network lifetime and limit the possibility of hotspot formation along the data transmission path, the need to plan a traffic-aware protocol is raised. In this research, we propose a traffic-aware routing protocol called PG-RES, which is predicated on the ideas of Pressure Gradient and RESistance concept. The proposed
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
Abstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More