Purpose: The current research attempts to diagnosis the reflection level of Information Technology (IT) Capabilities (Architectural, infrastructure, human resources, relationships resources, and dynamic capabilities) at Baghdad soft drinks Company/Al- Zafaraniya to achieving the competitive superiority represented by indicators (Cost, quality, flexibility, delivery and innovation). Recognizing the importance of the subjects studied, and because of the importance of the expected results of the field under consideration.
Design/Methodology/Approach: The experimental method has been used, the questionnaire used to collect th
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
Resumen
El presente trabajo nace de una inquietud por la enseñanza del español en Irak a nivel universitario especialmente ante las dificultades que los alumnos árabes en general, e iraquíes en particular, encuentran en su proceso de aprendizaje. Nuestra primera inclinación fue, pues, prestar una atención directa y cercana al alumno como sujeto del aprendizaje, así como a lo que el alumno produce como resultado del mismo. En el presente trabajo pretendemos dotar al estudiante de los conocimientos lingüísticos necesarios para poder interaccionar en una variedad de situaciones y enfrentarse a problemas cotidianos, de manera que desarrolle las destrezas comunicativas que le permitan establecer una co
... Show MoreThe main idea of this research is that the researcher believes that media research remains useless unless its goals and results are achieved by using the correct scientific tools. The researcher chooses 100 research papers of about 35% of the published ones, 10 of them are excluded because they are outside media. We use a simple and randomized sample including the three departments of media: journalism, television and radio journalism and public relations. The researcher adopts statistical methods such as Fay coefficient, correlation coefficient, Pearson correlation coefficient and straight line equation.
The researcher uses an analytical form followed by analysis of content, them the scale. The results are found in 58 researches, w
The study is dealing with an application reengineering process clean solar cells in the Ministry of electricity, as aimed at the possibility of the applicability and impact of re-engineering to achieve the level of performance of the Ministry's operations, with the application of the cleaning process solar cells, developed, improved and found a correlation, statistically significant effect between variable re-engineering and performance as well as the application of process reengineering clean solar cells:1- Before the re-engineering process the total time for cleaning up and solar cell 20 minutes and number of columns performed per day 24 columns and total columns750 which were completed per month that re
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreBackground: Swine influenza (also Called pig influenza, swine flu, hog flu and pig flu) is an infection by any one of several types of swine influenza virus (SIV) or S-OIV (Swine-Origin influenza virus) is any strain of the influenza family of viruses that is endemic in pigs. Patients and Methods:- Ninety patients with there families suspected of swine flu who were admitted to Central Teaching Hospital of Pediatric in Baghdad seventy one from Baghdad Al-Kerkh, twelve from Baghdad Al-Rasafa and seven other Iraqi Governorate (1 in Suleimaniya, 2 in Baquba, 4 in Anbar) they were included in a prospective study started from the 1st October till the 30 th of November 2009. Results:- The study revealed from )90( suspected cases the H1N1 Virus Pos
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More