Abstract
The current research aims at identifying any of the dimensions of organizational learning abilities that are more influential in the knowledge capital of the university and the extent to which they can be applied effectively at Wasit University. The current research dealt with organizational learning abilities as an explanatory variable in four dimensions (Experimentation and openness, sharing and transfer of knowledge, dialogue, interaction with the external environment ), and knowledge capital as a transient variable, with four dimensions (human capital, structural capital, client capital, operational capital). The problem of research is the following questio
... Show MoreIn this paper, a theoretical investigation was suggested to study underwater wireless optical communication (UWOC) system based on multiple input–multiple output (MIMO) technique. The modulation schemes such as RZ-OOK, NRZ-OOK, 32-PPM and 4-QAM applied under different coastal water types. MIMO technique enabled the system to transmit data rate with longer distance link. The performance of the proposed system examined by BER and data rate as a metrics. Several impairments such as the types of water by the attenuation of coastal water and the distance link were taken into account for the transmission of the optical signal to appreciate the reliability of the MIMO technique. The theore
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThis work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreThe study aimed to identify Human Papillomavirus (HPV) and its genotypes prevalent among Iraqi women. They collected 89 cervical swab samples from diagnosed patients at Baghdad Teaching Hospital's Early Detection Clinic. Using PCR technique on 19 samples, they found HPV16 (57.89%) and HPV6 (10.52%) genotypes, while HPV-11, 18, and 45 were absent. HPV 16 and HPV 6 were common in cervical cancer among Iraqi women. Sequencing revealed nucleic acid variants in HPV-6 (124A>C) and HPV-16 (225G>T) E6 genes, resulting in silent effects on the encoded protein. These changes didn't alter amino acid residues (p.74I= and p.L117=). Phylogenetic analysis showed substantial distances between their samples and other viral types, indicating di
... Show MoreHuman Adenosine deaminase is an essential enzyme for modulating the bioactivity of thyroid hormones, and It is important for the maturation and differentiation of lymphocytes, although its clinical importance in thyroid diseases have yet to be identified. Objective: The aim of the current study is to determine the Adenosine deaminase concentration in healthy controls, and in autoimmune thyroid diseases such as Graves' Disease, and Hashimoto's Thyroiditis. Patients and methods: A total of 183 serum specimens of 103 female patients with autoimmune thyroid diseases and 80 healthy control groups were included in this study and collected from the Baghdad Medical City, Iraq. Quantitative Human Adenosine Deaminase ELISA kits were used to estimate
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreKey generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show More