The mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th
... Show MoreThis research study examines the impact of information technology on firm profitability and stock returns. Using a comprehensive dataset of firms across various industries, this research employs rigorous statistical analysis techniques to investigate the relationship between IT investments, firm profitability metrics, and stock returns. The study focuses at how IT investments affect financial performance measures including return on assets (ROA) and return on equity (ROE), with P-values of 0.34 and 0.12, respectively. Furthermore, the study investigates the influence of IT on stock returns, taking into account market capitalization, industry trends, and macroeconomic variables. This study's conclusions center on the beneficial assoc
... Show MoreThis research aims to demonstrate the knowledge pillars of the product life cycle assessment technique and how to measure the cost according to this technique, and to clarify its role in reducing costs, improving product quality and optimizing the use of available resources, and a set of results has been reached, the most important of which are: The separation of environmental costs through the use of product life cycle assessment technique helps the Management in handling the increase of these costs, reducing the rates of environmental pollution and preserving resources, which contributes to achieving the sustainability of the product, and based on the results obtained, a set of recommendations were presented, the most important of which w
... Show MoreThis study aimed to identify the political factors influencing the performance of specialized journalists in Iraqi electronic newspapers. The significance of the study stems from the role of communication in newspapers that have established themselves in reality due to their wide dissemination, multiple uses, expanding freedom base, and the current diversity in perspectives. These newspapers highlight and publish societal issues of concern. The importance of these newspapers is associated with their creators who face various factors affecting their value and performance, whether positively or negatively. In light of this, the political factor was identified as the primary driver for other influencing factors. The
... Show MoreThis research aim to recognize
satisfy of life in the university's student and balance in satisfy of life
according to two type aveirable sex specific and find type and
relationship's director between satisfy of life and character big factors.
and known hom much that Factors in satisfy of life, the research sample
consist of (401) student male and female and from both specified in
Baghdad's University, researcher bult scale of Costa &McCrae Fore the
fire big Factors to Personality, research result That the university's
student low level of satisfy of life and there are no different statically if
they are scientific or human in their study. And there is positive and there
is positive and indicate relation
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreCoronavirus 2019 (COVID-19) pandemic led to a massive global socio-economic tragedy that has impacted the ecosystem. This paper aims to contextualize urban and rural environmental situations during the COVID-19 pandemic in the Middle East and North Africa (MENA) Region.
An online survey was conducted, 6770 participants were included in the final analysis, and 64% were females. The majority of the participants were urban citizens (74%). Over 50% of the urban residents significantly (
Background: Autism is a complex developmental disability that typically appears during the first three years of life. Autism affects the normal development of the brain in the areas of social interaction and communication skills.Objectives: To identify risk factors for Autism among a sample of autistic children in Baghdad city. Type of the study: this is a case – control, study. Methods: This study was conducted during the period of data collection extended from first of November 2010 until the first of April 2011,The total number of children involved was 100children with diagnosis of autism. Handred children who are free from autism were taken as the control sample. Results: there was a significant association between paternal age and
... Show MoreThe file upload is one of the controls of the tool bar of the VisualStodio.NET, but it can’t be used with Ajax technology (It's almost impossible today to be involved in web application design or development and not be aware of Ajax) because the file upload control don’t support Ajax technology that the execution of the instruction is not completed or the (object is not set) message will appear, although the essential need to use this control with Ajax to gain the asynchronous data transfer that supplied by Ajax, because the file upload don’t work without the Postback operation from the client to the server, and the main idea of Ajax technology is working without Postback operation to the server. After the deep resea
... Show MoreIn this work various correlation methods were employed to investigate the annual cross-correlation patterns among three different ionospheric parameters: Optimum Working Frequency (OWF), Highest Probable Frequency (HPF), and Best Usable Frequency (BUF). The annual predicted dataset for these parameters were generated using VOCAP and ASASPS models based on the monthly Sunspot Numbers (SSN) during two years of solar cycle 24, minimum 2009 and maximum 2014. The investigation was conducted for Thirty-two different transmitter/receiver stations distributed over Middle East. The locations were selected based on the geodesic parameters which were calculated for different path lengths (500, 1000, 1500, and 2000) km and bearings (N, NE, E, S
... Show More