The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
Transient displacement of laminated plates under combined load based on Mantari' s displacement field are investigated. The solution is implemented under transient mechanical load (sinusoidal, step and triangular sinusoidal distributed pressures pulse) and thermal buckling for plates with different layer orientation and thickness ratio. Equations of motion based on higher-order theory are derived through Hamilton' s principle, and solved using Naviertype solution for simply supported laminated plates. The results are presented for many effective parameters such as the number of laminate and orientation on the dynamic response of plates. Results show the validity of this displacement field in studying response of laminated thick and
... Show MoreThis work is devoted to study the properties of the ground states such as the root-mean square ( ) proton, charge, neutron and matter radii, nuclear density distributions and elastic electron scattering charge form factors for Carbon Isotopes (9C, 12C, 13C, 15C, 16C, 17C, 19C and 22C). The calculations are based on two approaches; the first is by applying the transformed harmonic-oscillator (THO) wavefunctions in local scale transformation (LST) to all nuclear subshells for only 9C, 12C, 13C and 22C. In the second approach, the 9C, 15C, 16C, 17C and 19C isotopes are studied by dividing the whole nuclear system into two parts; the first is the compact core part and the second is the halo part. The core and halo parts are studied using the
... Show MoreIraqi bentonite is used as main material for preparing ceramic samples with the additions of alumina and magnesia. X-ray diffractions analyses were carried out for the raw material at room temperature. The sequence of mineral phase's transformations of the bentonite for temperatures 1000 ,1100 ,1200 and 1250 ºC reflects that it finally transformed in to mullite 39.18% and cristobalite 62.82%. Samples of different weight constituent were prepared. The effect of its constitutional change reveals through its heat treatments at 1000,1100,1200,1250and 1300ºC .The samples of additions less than 15% of alumina and magnesia could not stand up to 1300ºC while the samples of addition more than 15% are stable .That is shown by analy
... Show MoreThe research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreInternational law has proven that it is an evolving and flexible law over the years, and despite that, this development takes a very long time, as the concept of peremptory norms took 83 years to crystallize and have concrete and impactful applications, and within this development another modern concept emerged, which is the obligations Erga Omnes in the Barcelona Traction case 1970. We have concluded that these two concepts fall under a broader concept, which is peremptory norms, and this concept represents the common supreme interests of the international community, and consists of rules that transcend all other rules in international law, and it is not permissible to derogate or deviate from them. On the other hand, it bears the oblig
... Show MoreThe aim of the research is to demonstrate the concept, characteristics, efficiency and adequacy of infrastructure in Khor Al-Zubair, as it represents an important benchmark for judging the development of the city. The researchers thus aim to measure the efficiency, adequacy and personal impression of each service in Khor Al-Zubair city and its residential neighborhoods. To meet this objective, the researchers used the descriptive and analytical approach that involves randomly distributing a questionnaire with specific questions to the neighbors of the city. The study has reached a set of results and recommendations that contribute to addressing the problems to the sector of infrastructure services in the city, such as: the per capita sha
... Show MoreThis study aimed at identity baying the difficulties which face public basic school
principals in jar ash governorate in editing formal letters and correspondence and means of
debating with these problems to collect data the researchers developed a question air were
established the population of the study which represents its sample consisted of 129 principals
65 males and 64 females
The results of the study revealed that the principals face difficulties in office and file
management in preparing plans and reports and writing formal letters and answering them
saved recommendations were presented among which were organizing training sessions and
workshops to train the principals on how to dead with there problems.<
The financial crises that occurred in South East Asia and America, and the discovery of the financial and administrative corruption that affected these companies, which led to the crisis. Since then, organizations and institutions interested in accounting have begun new ways to further rationalize the management of these companies. Hence the concept of governance, which means good governance. Al-Susiya confirmed its adoption of the financial reporting standards and adopted internal and external auditing for the purpose of increasing the reliability and credibility of the financial and reports that increase the confidence of investors in making their investment decisions in the financial markets The study dealt with the contributi
... Show More