Preferred Language
Articles
/
3BZwV4cBVTCNdQwC_Ubw
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
...Show More Authors

The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.

Crossref
View Publication
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital modeling and its technical variables in contemporary interior design
...Show More Authors

The current research sheds light on an important aspect of the great and rapid development in the field of science and technology and modern manufacturing methods as a result of the scientific revolution resulting from the accelerated cognitive development, which prompted designers in general and interior design in particular to exploit and invest in digital technology and the development of digital control in the process of designing the industrial product for the purpose of creativity and innovation through these digital programs Digital models achieve the requirements and desires of the interior designer according to the creative skill using modern software with high efficiency And extreme accuracy that is consistent with the requirem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Institutional Structures and the Transformation of the Private Sector in Iraq
...Show More Authors

            Requires economic work finding built institutional paint strategies and policies are formulated general economic and clarity in its stated objectives and the involvement of all economic institutions, political and stakeholders to discuss all the issues of economic, financial, monetary and analyzed for the purpose of renewal energies and determine the duties and responsibilities, leaving full freedom to the private sector in the formation of institutions to carry out his duties economic, and that the institutional structures to create the right climate for the implementation of its economic policies, which would facilitate the task of the private sector, and this h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 13 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the anterior loop of the mental nerve incidence and extension in different age groups in Sulaimania city using digital panoramic imaging system
...Show More Authors

Background: The anterior loop of mental nerve is commonly described as that part of the neurovascular bundle that transverses anterior and inferior to the mental foramen only to loop back to exit the mental foramen. The aim of the study is to evaluate the incidence and extension of anterior loop of mental nerve by using digital panoramic imaging system to avoid nerve damage during different surgical procedures in dentistry. Materials and Method: Panoramic image was taken for all 400 patients and stored in the computer. Then Horizontal and Vertical for the anterior loop extension when exist was measured and recorded in a special case sheet prepared for each subject. Results: Results indicated that out of 400 patients there were only 25 pat

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Mechanical Engineering
Innovations and Requirements of Strategy for Digital Maintenance Management in Construction Project
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the Quality of Health Services from Patients’ Perspective: A Comparative Study between Public and Private Hospitals
...Show More Authors

ASTRACT

The current study aimed to identify the quality of health services provided by the Omani health sector through the comparison between public and private hospitals in Dhofar Governorate, Oman. A questionnaire has been developed to collect data from 360 patients who received health services in one public Hospital (Sultan Qaboos) and three private Hospitals (Badr Al-Sama, Lifeline, and Al-Hakeeim). The data were analyzed using independent samples T-Test and One Way ANOVA. The results of the study showed that the quality levels of health services offered in private hospitals were better than public hospitals. The study results also reveled that there are significant differences between public hospitals and private hos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The role of the woman in protecting children from wrong behavioral deviations
...Show More Authors

Wrong behavioral deviations among youth witnessed an obvious growing, some of these deviations are, robbery, drug and internet addiction, and smoking. Additionally, intellectual extremism and the disrespect of the traditions and genuine customs, In light of this issue, the research aims to shed light on the educational and preventative role of the woman in protecting and immunizing children from the wrong behavioral deviations. The woman has a significant and influential role in the society in general and in her family, in particular to the responsibility lies on her. The research shed light on the manifestations of behavioral deviation in children and the mechanisms of prevention and treatment. The research concluded with a set of recom

... Show More
View Publication Preview PDF