This research amid to measure the impact of organizational flexibility (structural flexibility, operational flexibility, and strategic flexibility) in achieving organizational prosperity and its dimensions (strategic agility, intellectual capital, innovation and sustainable competitive advantage) in a number of Iraqi cellular communications companies. The research adopted descriptive analytical approach. A sample of (85) persons from the research community was selected, which included (Department managers, Directors administrative units, Communication engineers), to answer the questionnaire prepared for this purpose. And to analyze data and derive results. Statist
... Show MorePregnancy and delivery are physiological conditions that are marked by abrupt alterations to hormones, immunological and molecular characters. The current study aimed to evaluate oxytocin (OT), prolactin (PRL), cortisol and insulin growth factor-2 (IGF-2) levels as physiological biomarkers; programmed cell death protein-1 (PD-1), programmed cell death ligand-1 (PD-L1),interleukin-6 (IL-6) as immunological biomarkers, and single nucleotide polymorphisms (SNPs; rs53576 and rs2254298) of oxytocin receptor gene OXTR as molecular factors in samples of Iraqi women undergoing caesarean section (CS) and normal delivery (ND). Blood samples were collected from 96 pregnant women at term with ages ranging between 16-43 years. Regarding
... Show MoreBackground: Psychological stress is considered the major etiological factor precipitating myofacial pain and temporomandibular disorders.It is known that stress induce various adaptational responses of physiologic systems. The process includes increase in the activity of the hypothalamic-pituitary-adrenal axis which promotes cortisol secretion. Salivary cortisol has been used as a measure of free circulating cortisol levels.The use of salivary biomarkers has gained increased popularity since collecting samples is non-invasive and painless. The aim of thisstudy was to evaluate the level of cortisol in saliva among sample of university students having myofacial pain, during the final exam period and whether this finding could have a significa
... Show MoreABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreThe research aims to demonstrate the impact of TDABC as a strategic technology compatible with the rapid developments and changes in the contemporary business environment) on pricing decisions. As TDABC provides a new philosophy in the process of allocating indirect costs through time directives of resources and activities to the goal of cost, identifying unused energy and associated costs, which provides the management of economic units with financial and non-financial information that helps them in the complex and dangerous decision-making process. Of pricing decisions. To achieve better pricing decisions in light of the endeavor to maintain customers in a highly competitive environment and a variety of alternatives, the resear
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing
... Show More