Preferred Language
Articles
/
3BZwV4cBVTCNdQwC_Ubw
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
...Show More Authors

The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.

Crossref
View Publication
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy control of mobile robot in slippery environment
...Show More Authors

 

The problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Applied Engineering Science
Transient analysis of laminated plates in thermal environment
...Show More Authors

Transient displacement of laminated plates under combined load based on Mantari' s displacement field are investigated. The solution is implemented under transient mechanical load (sinusoidal, step and triangular sinusoidal distributed pressures pulse) and thermal buckling for plates with different layer orientation and thickness ratio. Equations of motion based on higher-order theory are derived through Hamilton' s principle, and solved using Naviertype solution for simply supported laminated plates. The results are presented for many effective parameters such as the number of laminate and orientation on the dynamic response of plates. Results show the validity of this displacement field in studying response of laminated thick and

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Nov 10 2017
Journal Name
Al–bahith Al–a'alami
Qualitative Research in Public Relations An Analytical: Study of Public Relations› Researches in Iraq from 1989 to 2016
...Show More Authors

In the mist of developments in the course of scientific research in general and humanities in particular and the accompanying changes in the visions and policies inspired by the need for these sciences to follow the qualitative methods in dealing with many of the topics or problems that require for their solution to obtain qualitative information which can be provided by resorting to quantitative research. Therefore, a new trend has emerged in many public relations› researchers who believe that qualitative research methods should be used by establishing scientific foundations and methodological classification based on the use of these methods and determining the nature of the subjects applied in them to reach results that are character

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Phase transformation study of Iraqi Bentonite with Al2O3 and MgO as additions at high temperatures
...Show More Authors

Iraqi bentonite is used as main material for preparing ceramic samples with the additions of alumina and magnesia. X-ray diffractions analyses were carried out for the raw material at room temperature. The sequence of mineral phase's transformations of the bentonite for temperatures 1000 ,1100 ,1200 and 1250 ºC reflects that it finally transformed in to mullite 39.18% and cristobalite 62.82%. Samples of different weight constituent were prepared. The effect of its constitutional change reveals through its heat treatments at 1000,1100,1200,1250and 1300ºC .The samples of additions less than 15% of alumina and magnesia could not stand up to 1300ºC while the samples of addition more than 15% are stable .That is shown by analy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Determination Of The Efficient Production Plans For Al-Shaheed Public Company By Using Tatget Motad Model Under Risk And Uncertainty
...Show More Authors

The research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative  model for the quadratic programming models.

The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management  of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's  performance .

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Implications of Financial Reporting Governance in rationalizing investors decisions In financial markets in light of An International Financial Reporting Standards (IFRS)/ An analytical study of a selected sample of the joint stock companies in Iraq
...Show More Authors

The financial crises that occurred in South East Asia and America, and the discovery of the financial and administrative corruption that affected these companies, which led to the crisis. Since then, organizations and institutions interested in accounting have begun new ways to further rationalize the management of these companies. Hence the concept of governance, which means good governance. Al-Susiya confirmed its adoption of the financial reporting standards and adopted internal and external auditing for the purpose of increasing the reliability and credibility of the financial and reports that increase the confidence of investors in making their investment decisions in the financial markets The study dealt with the contributi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Difficulties which Face Public Basic School Principals in Jarash Governorate in Editing Formal Letters and Correspondence and Means of Dealing With These Problems as Perceived by Them
...Show More Authors

This study aimed at identity baying the difficulties which face public basic school
principals in jar ash governorate in editing formal letters and correspondence and means of
debating with these problems to collect data the researchers developed a question air were
established the population of the study which represents its sample consisted of 129 principals
65 males and 64 females
The results of the study revealed that the principals face difficulties in office and file
management in preparing plans and reports and writing formal letters and answering them
saved recommendations were presented among which were organizing training sessions and
workshops to train the principals on how to dead with there problems.<

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Superiority of Peremptory Norms in Public International Law
...Show More Authors

International law has proven that it is an evolving and flexible law over the years, and despite that, this development takes a very long time, as the concept of peremptory norms took 83 years to crystallize and have concrete and impactful applications, and within this development another modern concept emerged, which is the obligations Erga Omnes in the Barcelona Traction case 1970. We have concluded that these two concepts fall under a broader concept, which is peremptory norms, and this concept represents the common supreme interests of the international community, and consists of rules that transcend all other rules in international law, and it is not permissible to derogate or deviate from them. On the other hand, it bears the oblig

... Show More
View Publication Preview PDF