Preferred Language
Articles
/
3BZwV4cBVTCNdQwC_Ubw
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
...Show More Authors

The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.

Crossref
View Publication
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Determination Of The Efficient Production Plans For Al-Shaheed Public Company By Using Tatget Motad Model Under Risk And Uncertainty
...Show More Authors

The research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative  model for the quadratic programming models.

The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management  of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's  performance .

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Effects of Using Static Methods with Contourlet Transformation on Speech Compression
...Show More Authors

Compression of speech signal is an essential field in signal processing. Speech compression is very important in today’s world, due to the limited bandwidth transmission and storage capacity. This paper explores a Contourlet transformation based methodology for the compression of the speech signal. In this methodology, the speech signal is analysed using Contourlet transformation coefficients with statistic methods as threshold values, such as Interquartile Filter (IQR), Average Absolute Deviation (AAD), Median Absolute Deviation (MAD) and standard deviation (STD), followed by the application of (Run length encoding) They are exploited for recording speech in different times (5, 30, and 120 seconds). A comparative study of performance

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Phase transformation study of Iraqi Bentonite with Al2O3 and MgO as additions at high temperatures
...Show More Authors

Iraqi bentonite is used as main material for preparing ceramic samples with the additions of alumina and magnesia. X-ray diffractions analyses were carried out for the raw material at room temperature. The sequence of mineral phase's transformations of the bentonite for temperatures 1000 ,1100 ,1200 and 1250 ºC reflects that it finally transformed in to mullite 39.18% and cristobalite 62.82%. Samples of different weight constituent were prepared. The effect of its constitutional change reveals through its heat treatments at 1000,1100,1200,1250and 1300ºC .The samples of additions less than 15% of alumina and magnesia could not stand up to 1300ºC while the samples of addition more than 15% are stable .That is shown by analy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Superiority of Peremptory Norms in Public International Law
...Show More Authors

International law has proven that it is an evolving and flexible law over the years, and despite that, this development takes a very long time, as the concept of peremptory norms took 83 years to crystallize and have concrete and impactful applications, and within this development another modern concept emerged, which is the obligations Erga Omnes in the Barcelona Traction case 1970. We have concluded that these two concepts fall under a broader concept, which is peremptory norms, and this concept represents the common supreme interests of the international community, and consists of rules that transcend all other rules in international law, and it is not permissible to derogate or deviate from them. On the other hand, it bears the oblig

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Latin American Journal Of Pharmacy
Irrational Use of Antibiotics in Iraqi Public Hospitals
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Difficulties which Face Public Basic School Principals in Jarash Governorate in Editing Formal Letters and Correspondence and Means of Dealing With These Problems as Perceived by Them
...Show More Authors

This study aimed at identity baying the difficulties which face public basic school
principals in jar ash governorate in editing formal letters and correspondence and means of
debating with these problems to collect data the researchers developed a question air were
established the population of the study which represents its sample consisted of 129 principals
65 males and 64 females
The results of the study revealed that the principals face difficulties in office and file
management in preparing plans and reports and writing formal letters and answering them
saved recommendations were presented among which were organizing training sessions and
workshops to train the principals on how to dead with there problems.<

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Study of nuclear structure for carbon isotopes using local scale transformation technique in shell model
...Show More Authors

This work is devoted to study the properties of the ground states such as the root-mean square ( ) proton, charge, neutron and matter radii, nuclear density distributions and elastic electron scattering charge form factors for Carbon Isotopes (9C, 12C, 13C, 15C, 16C, 17C, 19C and 22C). The calculations are based on two approaches; the first is by applying the transformed harmonic-oscillator (THO) wavefunctions in local scale transformation (LST) to all nuclear subshells for only 9C, 12C, 13C and 22C. In the second approach, the 9C, 15C, 16C, 17C and 19C isotopes are studied by dividing the whole nuclear system into two parts; the first is the compact core part and the second is the halo part. The core and halo parts are studied using the

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study of Performance of Air Filters in Public Shelters
...Show More Authors

View Publication Preview PDF