Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the effectiveness of the applied method was verified through an example.
The whole research paper examines the impact of ozone as either a just use-alone and coagulation benefit, mainly upon the reduction of dissolved organic carbon from the water with a moderate rate of DOC 10.75 mg/land CaCO3 calcium hardness 300 mg/l. A raw water sample has been taken from the Tigris River (Baghdad, Iraq) was being adopted in research work. The performance of ozone therapy has been assessed by calculations of DOC, DOC quantities, UV254, as well as total trihalomethane (TTHM). Research findings have shown that with 0.9 mg O3/mg DOC ozone use-alone, approximately 60% UV254 reduction and approximately 28% DOC reduction will occur.DOC fractionation analysis indicates that within the water samples, ozone could alter the co
... Show MoreAbstract: Colloidal gold nanoparticles (ringworm Palm or in the form of paper willow) have been prepared from HAuCl4 containing aqueous solution by hot chemical reduction method. The colloidal gold nanoparticles were characterized by SEM, EDX, and UV-VIS absorption spectroscopy. It was found that the variation of reduction time from boiling point affects the size of the nanoparticles and also in chemical reduction approach the size of nanoparticles can be controlled by varying the amount of variation the volume of reductant material with respect to the volume of HAuCL4.
Objective: To evaluate the functional outcome of percutaneous cross two K wires fixation for Gartland types II and III fractures of humerus. Methodology: This prospective study included80 patients with supracondylar humeral fracture, who underwent closed reduction and fixation by two crossed Kirschner wires. We included children with age < 15 years with closed fractures with Gartland types II and III, while the patient with vascular injury, open, irreducible fractures were excluded. The patients were following up for 6 months and assessed functionally by Flynn’s criteria. Results: The mean age of patients was 8.1 years. Trauma while child playing was the main mechanism of injury in 43 (59.8%) children and 46 (57.5%) fractures were of the
... Show MoreWith the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch
One of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show MoreThe current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative , flowery growth , yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1= cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses)
... Show MoreThe research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the
... Show More