The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
Automated medical diagnosis is an important topic, especially in detection and classification of diseases. Malaria is one of the most widespread diseases, with more than 200 million cases, according to the 2016 WHO report. Malaria is usually diagnosed using thin and thick blood smears under a microscope. However, proper diagnosis is difficult, especially in poor countries where the disease is most widespread. Therefore, automatic diagnostics helps in identifying the disease through images of red blood cells, with the use of machine learning techniques and digital image processing. This paper presents an accurate model using a Deep Convolutional Neural Network build from scratch. The paper also proposed three CNN
... Show MoreThe concession rights established for the public treasury are returned to the debtor’s funds, whether they are real estate or movables, and they may be returned to a specific amount of these funds, in accordance with the relevant laws. The legislator in the United Arab Emirates, according to the general rules, did not stipulate that this right be registered with the competent real estate registration department. This may lead to the sale of the property securing the concession right of the public treasury without the knowledge of the competent department of the treasury department to claim this right.
In selling by judicial public auction, the legislator requires certain procedures through which the real estate is purged of acc
... Show MoreThe present study aims to test a range of hypotheses about the effectiveness of each of the theory of transactional leadership, and the theory of transformational leadership in the Egyptian environment, and to identify any of them are better able to predict the effectiveness of leadership. And after the effect will be to identify the quality of the relationship between the leader and the subordinate in leadership , and what is the role of transformational leadership dimensions influencing the effectiveness of leadership. The field study was conducted on a sample of companies' public and private sector and the government in Egypt. The results of the study resulted in experimental that transacti
... Show MoreBaghdad Lake Touristic is suffering from a lake of tourism and entertainment services
efficiency provided to their visitors , knowing that this type of services as they are the basics
to achieve economic and socialist development because of their indicators where their goal is
to serve human in city as they represent lungs which population breathe within .
The Parks are resorted as human usually in search of quiet and funny places , away from
the noise of the city and its complex , as well as they give the city a beauty manifestations ,
that give happiness.
The study reached that there is deficiencies in service present, inability to provide
services and inadequate for the population and bad distribution. So the s
The main task of creating new digital images of different skin diseases is to increase the resolution of the specific textures and colors of each skin disease. In this paper, the performance of generative adversarial networks has been optimized to generate multicolor and histological color digital images of a variety of skin diseases (melanoma, birthmarks, and basal cell carcinomas). Two architectures for generative adversarial networks were built using two models: the first is a model for generating new images of dermatology through training processes, and the second is a discrimination model whose main task is to identify the generated digital images as either real or fake. The gray wolf swarm algorithm and the whale swarm alg
... Show MoreThe international humanitarian law found the special rules to protect women meanwhile the armed conflicts whether international or non-international. These rules are adopted for woman because of two reasons : that she is from civilians and on the other hand that her special constitution demands a special protection. The international community's attention of women is increased as a result of the tragic situation that faced women around the world especially in the Middle East and particularly in Iraq during the American-British war and ISIS period, these two periods sort many negative effects that reach women such as captivity, slavery, sexual enslavement and rape women especially Yazidis and Christians....
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe aim of this paper is to compare between classical and fuzzy filters for removing different types of noise in gray scale images. The processing used consists of three steps. First, different types of noise are added to the original image to produce a noisy image (with different noise ratios). Second, classical and fuzzy filters are used to filter the noisy image. Finally, comparing between resulting images depending on a quantitative measure called Peak Signal-to-Noise Ratio (PSNR) to determine the best filter in each case.
The image used in this paper is a 512 * 512 pixel and the size of all filters is a square window of size 3*3. Results indicate that fuzzy filters achieve varying successes in noise reduction in image compared to
Mobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co
... Show More