The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved. In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)
... Show MoreIn this paper, we proposed a hybrid control methodology using improved artificial potential field with modify cat swarm algorithm to path planning of decoupled multi-mobile robot in dynamic environment. The proposed method consists of two phase: in the first phase, Artificial Potential Field method (APF) is used to generate path for each one of robots and avoided static obstacles in environment, and improved this method to solve the local minimum problem by using A* algorithm with B-Spline curve while in the second phase, modify Cat Swarm Algorithm (CSA) is used to control collision that occurs among robots or between robot with movable obstacles by using two behaviour modes: seek mode and track mode. Experimental results show that the p
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreThe Vogue of the Restoration Comedy of Manners and George Etherage's The Man of Mode; or, Sir Fopling Flutter
The aim of the research is to shed light on the dimensions of the strategic lens and its impact on achieving the pioneer tax performance and represented by the dimensions (strategic direction, growth, pilot indicator, renewal and modernization, efficiency and effectiveness) in the General Tax Authority. The questionnaire was adopted as a tool to collect data and information from the adult sample They are (91) who are on the site (Assistant Director General, Head of Division, First Division Deputy, Second Division Deputy, Division Officer, Division Officer Associate) The statistical program (SPSS) has been used to calculate (the mean, the standard deviation, the correlation coefficient, the difference coefficient, the F test, the
... Show MoreThis research is concerned with studying (the concept of freedom in the texts of Yaşar Kamal the play), as the Turkish playwright (Kamal Yasar) is one of the contemporary playwrights who have been interested in and criticize society, and perhaps the concept of freedom in his texts took a different form, through his ability to renew and present his attempts to create A theatrical form different from his earlier writers in dealing with the life of the peasants and the oppression that went through them, as the researcher identified the problem of his research with the following question: What is the concept of freedom in the texts of Yashar Kamal? The research aims to define the concept of freedom in the texts of Yashar Kamal of the play,
... Show MoreThis research aims to examine the ability of impact of the cash flow statement indicators in the change in the market value of the industrial firms listed on the Palestine Stock Exchange. The research population consisted of (13) firms during the period (2015-2020). Data were collected from the annual financial statements of the firms. The research relies on the Pooled effects model to analyze the cross-section data (Panel Data), and the multiple regression method to test the hypotheses. The research finds a positive significant impact of (the ratios of cash flows from operating activities to sales, the return on assets from operating cash flows, and cash flows from operating activities to total current liabilities) in the change
... Show MoreCurrent research sought to evaluate the performance and results of employees in accordance with normative to people and people result for the European model of excellence EFQM 2013 quality management Foundation in the Inspector General's Office/Ministry of health, so as to pursue a modern and advanced management methods in evaluating performance and the performance of the Office's relationship with a citizen's life, since it takes him beyond the accepted service capabilities today, but it became budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and continuous improvement and development as well as The primary role of the
... Show More