Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the effectiveness of the applied method was verified through an example.
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
The study aims to clarify the impact of growth in the industrial sector on economic growth in the Iraqi economics according to the methodology of Kaldor for (2017-2030) , taking into consideration the effect of the accumulation of capital in the calculation of growth rates in the economy through productivity estimate of Total Factor Productivity (TFP) to growth in the economy, which is why the study assumes a formula to comply with the laws of Kaldor growth models developed requirements. This study is the most important to find out the development of the laws of Kaldor among Arabic studies, especially the first and third, so that the relationship between the growth of industrial production and economic growth as represented
... Show MoreCancer disease has a complicated pathophysiology and is one of the major causes of death and morbidity. Classical cancer therapies include chemotherapy, radiation therapy, and immunotherapy. A typical treatment is chemotherapy, which delivers cytotoxic medications to patients to suppress the uncontrolled growth of cancerous cells. Conventional oral medication has a number of drawbacks, including a lack of selectivity, cytotoxicity, and multi-drug resistance, all of which offer significant obstacles to effective cancer treatment. Multidrug resistance (MDR) remains a major challenge for effective cancer chemotherapeutic interventions. The advent of nanotechnology approach has developed the field of tumor diagnosis and treatment. Cancer nanote
... Show MoreCeruloplasmin (Cp) is one of the acute phase protein, in this review ,we studied the level of ceruloplasmin with copper (Cu) and iron in 90 patients with coronary heart diseas ( those patients are divided into three groups, whom are stable angina , unstable angina and myocardial infarction compared with 30 healthy volunteers) and the roles of them as diagnostic and prognostic tools.The diagnosis was attend by a clinical examination carried out by the consult medical staff in Ibn AL-Nafis hospital. The result: ceruloplasmin recorded a significantly(p<0.05)higher level in all patient groups compared with the control, so this result supports the hypothesis that a high serum ceruloplasmin level is a risk factor for coronary heart di
... Show MoreIn Iraq, more than 1031 school projects have been halted due to disputes and claims resulting from financial, contractual, or other issues. This research aims to identify, prioritize, and allocate the most critical risk factors that threaten these projects’ success for the duration (2017-2022). Based on a multi-step methodology developed through systematic literature reviews, realistic case studies, and semi-structured interviews, 47 risk factors were identified. Based on 153 verified responses, the survey reveals that the top-ranked risk factors are corruption and bribery, delaying the payments of the financial dues to the contractors or sub-contractors, absence of risk management strategy, multiple change orders due
... Show MoreThis paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show More