Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Analysis on the Applicability of Meta-Heuristic Searching Techniques for Automated Test Data Generation in Automatic Programming Assessment
...Show More Authors

Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Sun Jun 24 2018
Journal Name
Journal Of Pharmacy Research
Transdermal drug delivery system: A review
...Show More Authors

Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Jan 26 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of the Immunohistochemical expression of EBV in oral lichen planus
...Show More Authors

Background: Oral lichen planus (OLP) is a chronic immunologic disease. The etiology of OLP is unknown, viral antigens (for example EBV) have been proposed as etiologic agents. OLP may get transformation to malignancy so research on the presence of these in OLP lesions seems to be necessary. The aim of this study was to evaluate EBV expression immunohistochemically in OLP. Materials and Methods: Tissue specimens of 30 formalin fixed, paraffin-embedded tissue Blocks histologically diagnosed oral lichen planus was performed to evaluate EBV expression. Results: Expression of EBV was detected in epithelium of (46.6%) in the study samples in (OLP). no statistically significant correlation was found with clinical parameters except for a significan

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Controlling the Unbalanced Voltages of a Series-Connected Lead-Acid Batteries in a PV Power Storage System using Dynamic Capacitor Technique
...Show More Authors

Lead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their respons

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
A Study of the Effect of Kaolin as a Fuel Oil Additive on the Corrosion Inhibition of Fireside Superheater Boiler Tubes
...Show More Authors

The objective of the present study is to determine the effect of Kaolin as a fuel oil additive to minimize the fireside corrosion of superheater boiler tubes of ASTM designation (A213-T22) by increasing the melting point of the formed slag on the outside tubes surface, through the formation of new compounds with protective properties to the metal surface. The study included measuring corrosion rates at different temperatures with and without additive use with various periods of time, through crucible test method and weight loss technique.

      A mathematical model represents the relation between corrosion rate and the studied variables, is obtained using statistical regression analysis. Using this model,

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Study the Effect of annealing temperature on the Structure of a-Se and Electrical Properties of a-Se/c-Si Heterojunction
...Show More Authors

In this work Study effect of annealing temperature on the Structure
of a-Se and electrical properties of a-Se/c-Si hetrojunction have been
studied.The hetrojunction fabricated by deposition of a-Se film on c-
Si using thermal evaporation.
Electrical properties of a-Se/ c-Si heterojunction include I-V
characteristics, in dark at different annealing temperature and C-V
characteristics are considered in the present work.
C-V characteristics suggested that the fabricated diode was
abrupt type, built in potential determined by extrapolation from
1/C2-V curve. The built - in potential (Vbi) for the Se/ Si System
was found to be increase from 1.21 to 1.62eV with increasing of
annealing temperature

View Publication Preview PDF
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Innervation of the pineal gland in the rat: A chromotolysis study
...Show More Authors

Back ground: The innervations of the pineal
gland from the superior cervical ganglion have
shown some form of a chromatolysis reaction.
Objective:
1-Tracing the innervations of the pineal gland by
removing the target tissue (the pineal gland in
this study) i.e. (pinealoctomy) and removal of the
superior cervical ganglion i.e. (ganglionectomy).
2- The localization and total number of the
neurons which project into the rat pineal gland
3-The effect of pinealoctomy on the SCG after a
different time interval.
Methods: Twenty five albino rats were used in
this study, Pinealoctomy was done, then after a
different time interval ganglionectomy was done,
in order to study the Chromatolysis in their cel

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 26 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of mandibular radiomorphometric indices as predictors of osteoporosis in postmenopausal women (Cephalometric reconstructed computed tomographical study)
...Show More Authors

Background: Osteoporosis affects almost all of the bones in the female body; the most important one in the facial bone is mandible. Menopause is defined as an absence of the menses for one year. During this time, estrongen, progesterone and ovarian androgens production are diminished due to adult onset ovarian failure which leads to osteoporosis. This study aimed to evaluate the use of computed tomography mandibular morphometric indices for the assessment of pre and postmenopausal osteoporotic women. Subjects and material: This study conducted on 50 Iraqi females divided into 2 groups 20 -30years old as a control group and over50 years old as a study group attending Al-Karkh hospital, Department of Computed Tomography.(each group25 female).

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
2018 Tenth International Conference On Advanced Computational Intelligence (icaci)
On high-level control of power-augmentation lower extremity exoskeletons: Human walking intention
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref